summaryrefslogtreecommitdiffstats
path: root/ansible_collections/cisco/ise
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-18 05:52:22 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-18 05:52:22 +0000
commit38b7c80217c4e72b1d8988eb1e60bb6e77334114 (patch)
tree356e9fd3762877d07cde52d21e77070aeff7e789 /ansible_collections/cisco/ise
parentAdding upstream version 7.7.0+dfsg. (diff)
downloadansible-38b7c80217c4e72b1d8988eb1e60bb6e77334114.tar.xz
ansible-38b7c80217c4e72b1d8988eb1e60bb6e77334114.zip
Adding upstream version 9.4.0+dfsg.upstream/9.4.0+dfsg
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'ansible_collections/cisco/ise')
-rw-r--r--ansible_collections/cisco/ise/.DS_Storebin10244 -> 10244 bytes
-rw-r--r--ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml3
-rw-r--r--ansible_collections/cisco/ise/.vscode/settings.json23
-rw-r--r--ansible_collections/cisco/ise/FILES.json1258
-rw-r--r--ansible_collections/cisco/ise/MANIFEST.json6
-rw-r--r--ansible_collections/cisco/ise/README.md14
-rw-r--r--ansible_collections/cisco/ise/changelogs/changelog.yaml61
-rw-r--r--ansible_collections/cisco/ise/docs/conf.py1
-rw-r--r--ansible_collections/cisco/ise/hosts8
-rw-r--r--ansible_collections/cisco/ise/meta/runtime.yml2
-rw-r--r--ansible_collections/cisco/ise/playbooks/aws_deployment.yml8
-rw-r--r--ansible_collections/cisco/ise/playbooks/azure_deployment.yml46
-rw-r--r--ansible_collections/cisco/ise/playbooks/b.yml130
-rw-r--r--ansible_collections/cisco/ise/playbooks/credentials.template2
-rw-r--r--ansible_collections/cisco/ise/playbooks/credentials.yml19
-rw-r--r--ansible_collections/cisco/ise/playbooks/group_vars/ise_servers2
-rw-r--r--ansible_collections/cisco/ise/playbooks/hosts8
-rw-r--r--ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml37
-rw-r--r--ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml19
-rw-r--r--ansible_collections/cisco/ise/playbooks/network_device.yml10
-rw-r--r--ansible_collections/cisco/ise/playbooks/playbookstest.yml183
-rw-r--r--ansible_collections/cisco/ise/playbooks/profiler-services.yml40
-rw-r--r--ansible_collections/cisco/ise/plugins/.DS_Storebin0 -> 8196 bytes
-rw-r--r--ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py19
-rw-r--r--ansible_collections/cisco/ise/plugins/action/configuration.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py)141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/configuration_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/connector_config.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py)120
-rw-r--r--ansible_collections/cisco/ise/plugins/action/connector_config_info.py101
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py)8
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py18
-rw-r--r--ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py90
-rw-r--r--ansible_collections/cisco/ise/plugins/action/endpoint.py16
-rw-r--r--ansible_collections/cisco/ise/plugins/action/filter_policy.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/action/network_device_group.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py1
-rw-r--r--ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_export_certs.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_register_node.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/action/rest_id_store.py5
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_vn.py)76
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py)12
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py98
-rw-r--r--ansible_collections/cisco/ise/plugins/action/subscriber_info.py (renamed from ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py)24
-rw-r--r--ansible_collections/cisco/ise/plugins/action/system_certificate.py16
-rw-r--r--ansible_collections/cisco/ise/plugins/action/test_connector.py98
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py267
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py88
-rw-r--r--ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py141
-rw-r--r--ansible_collections/cisco/ise/plugins/doc_fragments/module.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/admin_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/authorization_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_cancel.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_restore.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/byod_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/configuration.py71
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/configuration_info.py51
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/connector_config.py305
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/connector_config_info.py111
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_delete.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_export_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_generate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/csr_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py54
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py54
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py60
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py57
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py (renamed from ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py)38
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/deployment_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py46
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py40
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py231
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py43
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py37
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py49
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_register.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/external_radius_server.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/filter_policy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_location_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_ssid.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_email.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_email.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/identity_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/identity_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/internal_user.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/internal_user_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/my_device_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py46
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py40
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py10
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py39
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py3
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py37
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_group.py12
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/network_device_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_promotion.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/node_sync.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_install.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/patch_rollback.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_theme.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/renew_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository_files_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/repository_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/resource_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/rest_id_store.py13
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sgt_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber.py150
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py92
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py69
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/subscriber_info.py (renamed from ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py)108
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/tasks_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/telemetry_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/test_connector.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py4
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py2
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py130
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py151
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py130
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py59
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py87
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py145
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py113
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py75
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py75
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py139
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py93
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py59
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py93
-rw-r--r--ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py149
-rw-r--r--ansible_collections/cisco/ise/plugins/plugin_utils/ise.py6
-rw-r--r--ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py4
-rw-r--r--ansible_collections/cisco/ise/requirements.txt2
-rw-r--r--ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt64
-rw-r--r--ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt96
-rw-r--r--ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt0
-rw-r--r--ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt64
476 files changed, 3882 insertions, 5091 deletions
diff --git a/ansible_collections/cisco/ise/.DS_Store b/ansible_collections/cisco/ise/.DS_Store
index 844cf6e75..f79cfc1f5 100644
--- a/ansible_collections/cisco/ise/.DS_Store
+++ b/ansible_collections/cisco/ise/.DS_Store
Binary files differ
diff --git a/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml b/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml
index 6928df134..dd455afad 100644
--- a/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml
+++ b/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml
@@ -14,9 +14,8 @@ jobs:
strategy:
matrix:
ansible:
- - stable-2.12
- - stable-2.13
- stable-2.14
+ - stable-2.15
- devel
runs-on: ubuntu-20.04
steps:
diff --git a/ansible_collections/cisco/ise/.vscode/settings.json b/ansible_collections/cisco/ise/.vscode/settings.json
index a7d0fc7b7..4f6146612 100644
--- a/ansible_collections/cisco/ise/.vscode/settings.json
+++ b/ansible_collections/cisco/ise/.vscode/settings.json
@@ -1,3 +1,24 @@
{
- "esbonio.sphinx.confDir": ""
+ "esbonio.sphinx.confDir": "",
+ "ansible.python.interpreterPath": "/usr/local/bin/python3.10",
+ "workbench.colorCustomizations": {
+ "activityBar.activeBackground": "#65c89b",
+ "activityBar.background": "#65c89b",
+ "activityBar.foreground": "#15202b",
+ "activityBar.inactiveForeground": "#15202b99",
+ "activityBarBadge.background": "#945bc4",
+ "activityBarBadge.foreground": "#e7e7e7",
+ "commandCenter.border": "#15202b99",
+ "sash.hoverBorder": "#65c89b",
+ "statusBar.background": "#42b883",
+ "statusBar.foreground": "#15202b",
+ "statusBarItem.hoverBackground": "#359268",
+ "statusBarItem.remoteBackground": "#42b883",
+ "statusBarItem.remoteForeground": "#15202b",
+ "titleBar.activeBackground": "#42b883",
+ "titleBar.activeForeground": "#15202b",
+ "titleBar.inactiveBackground": "#42b88399",
+ "titleBar.inactiveForeground": "#15202b99"
+ },
+ "peacock.remoteColor": "#42b883"
} \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/FILES.json b/ansible_collections/cisco/ise/FILES.json
index c2d105878..4c183e093 100644
--- a/ansible_collections/cisco/ise/FILES.json
+++ b/ansible_collections/cisco/ise/FILES.json
@@ -11,7 +11,7 @@
"name": ".DS_Store",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1188de753911b2e8f232a8c9e3a0df7707182b5c765a589e8f62825dad126456",
+ "chksum_sha256": "437cf9da8611bcc8837aef2444e9e00fc44f8f071f750224be185a74168f2e5f",
"format": 1
},
{
@@ -25,7 +25,7 @@
"name": "requirements.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ea92856a54fce9950dccb45def09112f0de768a7894c8de6adf6b4cb83897491",
+ "chksum_sha256": "b5a620581f1eb701a6e7bce54457bc44c196732cc5b8d82ae728c285e8d51264",
"format": 1
},
{
@@ -36,6 +36,13 @@
"format": 1
},
{
+ "name": "plugins/.DS_Store",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "389b6b15b162e5db97c1c6d4ddc0f1161590c016eb06e49734d10373aabc3c56",
+ "format": 1
+ },
+ {
"name": "plugins/doc_fragments",
"ftype": "dir",
"chksum_type": null,
@@ -46,7 +53,7 @@
"name": "plugins/doc_fragments/module_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1a39e66ef125592960d7d3972a30ad82ee4dbcd35d0c07052b316e6694d71a57",
+ "chksum_sha256": "3c03cbe8b754daa452f52e5932003010e140e2861da753a1f51ff43b7879dfc2",
"format": 1
},
{
@@ -60,7 +67,7 @@
"name": "plugins/doc_fragments/module.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0d33685ce2c04ce923d703730ed78cfadb6a97d44c5e3441471d2dc1171ca059",
+ "chksum_sha256": "53a1c31be129aeaa4e9308845221e148e9cff3d6a13ae43ea05ba2358dfb3953",
"format": 1
},
{
@@ -99,6 +106,13 @@
"format": 1
},
{
+ "name": "plugins/action/test_connector.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "f16380be3ff68f3e263a612f4a051c045e84dda1eeb5f635d5317b26ec9b8c7e",
+ "format": 1
+ },
+ {
"name": "plugins/action/network_device_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -130,7 +144,7 @@
"name": "plugins/action/node_services_profiler_probe_config.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "84dc398a3fb106bb1e292098694c9771230a007387778b66a7929596f0097e6b",
+ "chksum_sha256": "7be342544dfbae8faf4f698ecd0038b92d8570831cff0667502502894d496bc9",
"format": 1
},
{
@@ -169,6 +183,13 @@
"format": 1
},
{
+ "name": "plugins/action/dictionary_references_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "a03f8b3e5467296dee3f555d61ebed7b93c74a7e7e527b40fa52a42d90164819",
+ "format": 1
+ },
+ {
"name": "plugins/action/anc_policy_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -183,10 +204,10 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_sg_vn_mapping_bulk_delete.py",
+ "name": "plugins/action/configuration.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "72efae5dd74552743f1f3b89f21d0bc39341c4fbea70d4c25552ebe56b5644e1",
+ "chksum_sha256": "28c31c878ee196752d7c003c4c69720b4dd5251739ca70de97cc0001547dfdad",
"format": 1
},
{
@@ -246,13 +267,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_sg_vn_mapping_bulk_update.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "97378c6cf992ca1cbcf06dbd5e5df21a11b02706a6af667cddefa4f382cb97ca",
- "format": 1
- },
- {
"name": "plugins/action/node_group.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -263,7 +277,7 @@
"name": "plugins/action/personas_export_certs.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "21164d32f135f20df72386358435b9860295fc71fbcdcbe60be1c174c4bd2f1d",
+ "chksum_sha256": "b73decde11488e39b11d2d7605b69a91d8987967b41b900a42dea24d85e02e0f",
"format": 1
},
{
@@ -288,6 +302,13 @@
"format": 1
},
{
+ "name": "plugins/action/subscriber_imsi_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "91ef4ff7daa43a4895cc80a845d0c66f2ccaa9e1b57d833e651e4a6557374f8f",
+ "format": 1
+ },
+ {
"name": "plugins/action/id_store_sequence_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -330,6 +351,13 @@
"format": 1
},
{
+ "name": "plugins/action/configuration_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "ec026ed478f51cedfce03de9d8ed59e78f59d414f74061f0d324ae128f93a082",
+ "format": 1
+ },
+ {
"name": "plugins/action/guest_user_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -375,7 +403,7 @@
"name": "plugins/action/node_primary_to_standalone.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "33fc439728a3a05cc2323aa9eaaa36dce606ff886dc203d1a44670cd09c074c3",
+ "chksum_sha256": "43bbca7b7f51510a95fef2d707cbeee0f752c9697b7cb5e2d8f977c0d776b9c8",
"format": 1
},
{
@@ -407,17 +435,17 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_sg_vn_mapping_bulk_create.py",
+ "name": "plugins/action/node_deployment_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "df2afad6de41d420e5c5a3716a3f112331c70506ba860775426ce1f9bac16129",
+ "chksum_sha256": "58c048cec4d4f1f244137605d60a27c494aa193d3f13781a9fbddfda20a5db99",
"format": 1
},
{
- "name": "plugins/action/node_deployment_info.py",
+ "name": "plugins/action/subscriber_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "58c048cec4d4f1f244137605d60a27c494aa193d3f13781a9fbddfda20a5db99",
+ "chksum_sha256": "16469a8610935851ae04741fd71adc955a98359756b03e0084d0d3f5e285fb0a",
"format": 1
},
{
@@ -501,7 +529,7 @@
"name": "plugins/action/network_access_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bcfba88947aa3db19d5ec0ca97a7558cea519234df5b6cb6db16f3be50cff524",
+ "chksum_sha256": "bdb109d68e3d2699c5991c4c8a090d81175010616ece761a5740e421be73ea13",
"format": 1
},
{
@@ -564,14 +592,14 @@
"name": "plugins/action/device_administration_local_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b242009a913fb7f493e118ec20f74cd5bed022652f6789e691db4449b6dd0dad",
+ "chksum_sha256": "2dbdf71eddcf95352dc2964af1fd12c4557f7b40d43d639ab4608882d6050a9b",
"format": 1
},
{
"name": "plugins/action/system_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "874b1a05952b04d49958aff03461a4f0d1d9135ffa12099a35d81cf97f513ade",
+ "chksum_sha256": "cc4b608a73575c36fdaa8f1c7beedcc9dd121f1165e999acf4082e8b93e7dc18",
"format": 1
},
{
@@ -589,13 +617,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_nbar_app_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "93ae77bc17fcfe76eb305f88b20992efce60b9367aa1e4b0306da7f7b2fb7d6a",
- "format": 1
- },
- {
"name": "plugins/action/tacacs_server_sequence.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -634,7 +655,7 @@
"name": "plugins/action/network_access_global_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "04b0464c0709a4743546f93a1401e3dd0fe96bf7298ef5e61447951b85320e3e",
+ "chksum_sha256": "e2ad4f96a0e00267a93cf134a1e1606bc3446c245ca04ba650a83525b20e2820",
"format": 1
},
{
@@ -659,6 +680,13 @@
"format": 1
},
{
+ "name": "plugins/action/dataconnect_settings_password.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "767abf8104ce3772b9657a8a4be56f87c97dc33355572e59587f828d29c01770",
+ "format": 1
+ },
+ {
"name": "plugins/action/pan_ha_update.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -676,14 +704,14 @@
"name": "plugins/action/network_access_time_date_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dad8895e0633822fd6e2b57fdcbaa9a9316b8131183c4559d2478c0e64d4678d",
+ "chksum_sha256": "fd6181558a6ab7b5e026b3ec098cedea9ba109d00ecf61e8b400c3d147698963",
"format": 1
},
{
"name": "plugins/action/device_administration_time_date_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5cbe37385d8e632876e49433e343488730535ca4497a25823b341d63c2903e05",
+ "chksum_sha256": "c7adf3188769d12e91f1a0c0832d8acfe994fad2f6196a081507adcb52221ae7",
"format": 1
},
{
@@ -736,24 +764,24 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_sg_vn_mapping_info.py",
+ "name": "plugins/action/tacacs_server_sequence_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "52ad97481f4cb4a604e5a4ab40f310400f73e261a30264d879bd60e40c79f8fc",
+ "chksum_sha256": "008f9abdadca0fb0e8bbb1109a6f070042b8329d4005b54f64c22057107953f8",
"format": 1
},
{
- "name": "plugins/action/tacacs_server_sequence_info.py",
+ "name": "plugins/action/sg_mapping_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "008f9abdadca0fb0e8bbb1109a6f070042b8329d4005b54f64c22057107953f8",
+ "chksum_sha256": "b23dc598542aea533c99eacce9a84756cafaf372c951daac5c82ef8450adae9c",
"format": 1
},
{
- "name": "plugins/action/sg_mapping_group_info.py",
+ "name": "plugins/action/dataconnect_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b23dc598542aea533c99eacce9a84756cafaf372c951daac5c82ef8450adae9c",
+ "chksum_sha256": "54c74d4796a53e5dcf6ddee6510b309ce8e2037f91eb6aa2929c394de2192ee4",
"format": 1
},
{
@@ -788,14 +816,7 @@
"name": "plugins/action/device_administration_authentication_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3c48c5587324e5d8edee6374acb940626c44b2f206b4ffac269a7c8d369f56b5",
- "format": 1
- },
- {
- "name": "plugins/action/trustsec_sg_vn_mapping.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "90fc4c8b3322a0a1669dbf5564466295da5d576b6642d1466cd39a38c9af452b",
+ "chksum_sha256": "c93ef8fc9e50d073a8c5c6f47f6eae589b6e32462f27d950cdbf16928f953005",
"format": 1
},
{
@@ -809,7 +830,7 @@
"name": "plugins/action/network_access_authentication_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "32448b1e8e9d9f908618ce9dc9a70c31b1ad6ced4741e1f2824d1a86a63026b0",
+ "chksum_sha256": "2e7b8a6fa1ea028935242cd364d7f34397e63d5ad1eadacfd98bdfc4af61bc84",
"format": 1
},
{
@@ -837,7 +858,7 @@
"name": "plugins/action/rest_id_store.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "24c7aca53602a189ac7952e6ed62d6977ba83d9682a651019549f346894a7f82",
+ "chksum_sha256": "3da2434a0c5bfe546c46cd039174d8377690efe131403da72df075285d98a2d9",
"format": 1
},
{
@@ -904,6 +925,13 @@
"format": 1
},
{
+ "name": "plugins/action/subscriber.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "029e75c9c59feedc8a1dbb5bf26e453f5728b2100bc92587708ac63a40e57bbb",
+ "format": 1
+ },
+ {
"name": "plugins/action/pxgrid_endpoints_by_os_type_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -925,13 +953,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_update.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "92e76bf9f97b9cba899dc48aba011d2f0dbb49cf2740866419681ae32ad748d0",
- "format": 1
- },
- {
"name": "plugins/action/licensing_smart_state_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -949,7 +970,7 @@
"name": "plugins/action/personas_update_roles_services.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6dbfec95a26d9be42a6b7e8afc9b74ab8978974b5447d269584f38fd4641947c",
+ "chksum_sha256": "9a594f0037e892cf08604d8ce5819f175870aab18a0fba06af17e525709c4c34",
"format": 1
},
{
@@ -974,13 +995,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "4fd514bda9fe8a19b8e92ee364d74788356da804d3dc2bbb234d3be37421b35a",
- "format": 1
- },
- {
"name": "plugins/action/licensing_eval_license_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1040,7 +1054,7 @@
"name": "plugins/action/personas_check_standalone.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a8a65a72d973621c0dd0881672113f53a06172b6a2ccd6e5b731c2855f682937",
+ "chksum_sha256": "e7ac40aebabdc8ad0861b2fd777eb42d02d46f86d2bcc6c11555c430c638a3c5",
"format": 1
},
{
@@ -1121,20 +1135,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_vlan_mapping.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "881d66b2f9e666ac130486e654647b412749e0a04960057269b3244031430202",
- "format": 1
- },
- {
- "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_create.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "63e23761602fc311195dbc00a9611fee982e01718bb2e8c0ef4c1259059f19b5",
- "format": 1
- },
- {
"name": "plugins/action/sponsor_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1166,7 +1166,7 @@
"name": "plugins/action/device_administration_global_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fabdcd5cbb34bca328d4b85b68f0e15db0fbd6b2e30e5c215a407d4e86a5f031",
+ "chksum_sha256": "71f7f337b4f2e125fcadcb5edb8ba618a8e121ccf35abd7e8813cda903073205",
"format": 1
},
{
@@ -1201,14 +1201,7 @@
"name": "plugins/action/personas_register_node.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "df41fe7f6b39fc73de8854b4533785c1f173b2924b2593b0ad79679867a7e131",
- "format": 1
- },
- {
- "name": "plugins/action/trustsec_vn.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "0054abbeaabc0253444fb7a75b79fa0b4213da9756b12d288e2f6e87a82203f5",
+ "chksum_sha256": "08ebf1dcb40cadfe6b938a7622443bca291a46a5b3bbc7e2c8be1566dc63a0e7",
"format": 1
},
{
@@ -1243,7 +1236,7 @@
"name": "plugins/action/personas_promote_primary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f9b7c99882b15717c52bf1421f771a482fee6ab7ea4ea1699169b7771b26a759",
+ "chksum_sha256": "281be6dd4a9d2ef171ad7451f32e782b6a9682588244a5fd9c870ad15d3f2b80",
"format": 1
},
{
@@ -1278,7 +1271,7 @@
"name": "plugins/action/node_standalone_to_primary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c95d4f90f04279b4c6930732ca9a17c1ad0c9f9eee2e8bdd84a866a0b5db9499",
+ "chksum_sha256": "883c2bea469a9a8ee73608d94aa033e31e154704347caac07130b04b9483dd7d",
"format": 1
},
{
@@ -1334,7 +1327,7 @@
"name": "plugins/action/device_administration_authorization_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d641d6bc65ebf4e91fe2d614ff95355d71d20fdedc333d1d2f4e68929d5caac3",
+ "chksum_sha256": "e83b48036a3a794e48993214700fb9ec5946ead5e127b523a403d13cffa8093d",
"format": 1
},
{
@@ -1355,7 +1348,7 @@
"name": "plugins/action/network_access_local_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7c2ade73bd6d2effbcb1985ba100786c23f9b0b8109b5297b874f15f08ccd50c",
+ "chksum_sha256": "21c2f6057be6e3e1da5195f37d7fc15898ad043baf50893163c58d406c2bf617",
"format": 1
},
{
@@ -1383,7 +1376,7 @@
"name": "plugins/action/device_administration_network_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b5b2f971484a77560e0b9a544646d20413f76932da8e3e77e66c7fca88921354",
+ "chksum_sha256": "7be2ed7ba81700afed9ebd90249dec20fb76324623b6fa695a619e8c92283995",
"format": 1
},
{
@@ -1558,7 +1551,7 @@
"name": "plugins/action/endpoint.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2e88f00a40e7df63a6fd15f88f23c7fc3f13e5f5dd2b4380f0d399e840b1a9ae",
+ "chksum_sha256": "671c3a0bc9391b9e07fa36e0246643c6274cac6c46ff5ffdc5947ffbcff717dd",
"format": 1
},
{
@@ -1576,13 +1569,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_bulk_create.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "88919feae044ade3c6a6d25c729c0f883f49d52f9b61bd3286709f495cbc6a64",
- "format": 1
- },
- {
"name": "plugins/action/node_group_node_create.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1709,6 +1695,13 @@
"format": 1
},
{
+ "name": "plugins/action/dataconnect_settings_password_expiry.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "1a322b5dda55d9f723529862f74efc35aa7a949f84a301827f3e6da8ffe6c441",
+ "format": 1
+ },
+ {
"name": "plugins/action/pxgrid_node_approve.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1723,6 +1716,13 @@
"format": 1
},
{
+ "name": "plugins/action/connector_config_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "a890d6dd2cebcc4802fa8043011b320f5fb58f79116f8899e53377455ae3f6dd",
+ "format": 1
+ },
+ {
"name": "plugins/action/guest_user_reset_password.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1740,7 +1740,7 @@
"name": "plugins/action/mnt_session_active_count_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c25a59bdca8063495549d9c8a619a04e9d9f1fbcb13a208aed4d826a5c01f8e6",
+ "chksum_sha256": "05e60cf3485bf22b50bf7ff003b58ed1d5029e103287a9498265df643c298b40",
"format": 1
},
{
@@ -1852,7 +1852,7 @@
"name": "plugins/action/node_secondary_to_primary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "229780ac85397dac346beced1ab4c433ac2acc139817d77f15230c84bd738951",
+ "chksum_sha256": "7e68dae78a3ed0b0729f98ba9ac28d25facdd22189962304638a31e954f89bfc",
"format": 1
},
{
@@ -1863,13 +1863,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_nbar_app.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "4740fca59d6dd94575754804fce18a2db249eaae7abc2f8116cd728fe2617af2",
- "format": 1
- },
- {
"name": "plugins/action/sgt_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -1905,17 +1898,10 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "546e383e2f7aab61515bb03753478b689c4459ae3c14bb2d468dbe2ac4ba1dcf",
- "format": 1
- },
- {
"name": "plugins/action/filter_policy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4fad28d38671562de7cd1ab39e2a12294c1d462fa1a6b3fcec3dee7fa22278e9",
+ "chksum_sha256": "5c47d833c364e1f85e82f6cbdd1eb224350ddd17aca726d1e74e3a0dc28c6472",
"format": 1
},
{
@@ -2031,24 +2017,24 @@
"format": 1
},
{
- "name": "plugins/action/patch_install.py",
+ "name": "plugins/action/subscriber_bulk.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "91b63e82314d36684ebeaecc578dd96600c5fe4d9001f5eeb3223adee009bac3",
+ "chksum_sha256": "16fdf4fcf23dca3250a9b0a973f321fe69e632771f090d7cae9712c681a93160",
"format": 1
},
{
- "name": "plugins/action/network_device_group.py",
+ "name": "plugins/action/patch_install.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "682f4caead156742b8e3674a4f28dc806013e56d0681d47bcf80c8a167ac0fa7",
+ "chksum_sha256": "91b63e82314d36684ebeaecc578dd96600c5fe4d9001f5eeb3223adee009bac3",
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_bulk_delete.py",
+ "name": "plugins/action/network_device_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bc83b1dfef409e740fdfd9e4b77dab6ea1db37ee04d73cd9acea16ea7983c6df",
+ "chksum_sha256": "e63101cc9853cd30514eb6f877f4fe736c6a6a926d644094dcedb8c420a5dc39",
"format": 1
},
{
@@ -2073,13 +2059,6 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_bulk_update.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2eb856aad4e996b4ab1c50b16377f5482546a45f1005db62e19d413a1a4fd04a",
- "format": 1
- },
- {
"name": "plugins/action/support_bundle_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -2206,6 +2185,13 @@
"format": 1
},
{
+ "name": "plugins/action/connector_config.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "64b85d5d97fe9b46c1c0a76c0de783665ff809ca6f878daca6fcabe25cb60038",
+ "format": 1
+ },
+ {
"name": "plugins/action/endpoint_group.py",
"ftype": "file",
"chksum_type": "sha256",
@@ -2216,7 +2202,7 @@
"name": "plugins/action/network_access_authorization_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "16781fb9826fb58c72767409f4cda9112291bab0e2a0f739ed7dee4577757dc3",
+ "chksum_sha256": "cb6f488bd1b5a36cdd2969afd03c99e9c75fe6b212609c4da88a028d3026001b",
"format": 1
},
{
@@ -2227,10 +2213,17 @@
"format": 1
},
{
+ "name": "plugins/action/dataconnect_settings_status.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "af13187b10320c878946b8b6d35dfa2e75d90a99b1c1bd3b58e711b13aa0e303",
+ "format": 1
+ },
+ {
"name": "plugins/action/device_administration_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4ca08c5e0210015b40b8c20406ad28cd7197a43c44116daee0e096199a2e14bc",
+ "chksum_sha256": "63b7a36946e865ba2f780cd0b480f365ebf84f28b06aed8ac49e17023c2cccb1",
"format": 1
},
{
@@ -2524,7 +2517,7 @@
"name": "plugins/action/active_directory_groups_by_domain_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1bcaf27db666ccd80e79b12a6c9c247d2d0fee6832dd8de501e7764ccbd15ac5",
+ "chksum_sha256": "cab601e9a87b6be84a397f18c1f4b205bbbb42af2518551594f7f665dbae5025",
"format": 1
},
{
@@ -2675,17 +2668,17 @@
"format": 1
},
{
- "name": "plugins/action/trustsec_vn_vlan_mapping_info.py",
+ "name": "plugins/action/external_radius_server.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0a41f84910e2c277846977ff9a72f6bef7266bf39606e9d2ea5c192e23172e63",
+ "chksum_sha256": "4d6e3bb3023b33797f53367f96ebc7ae5c99659bc6d50546ee2a8714778cf951",
"format": 1
},
{
- "name": "plugins/action/external_radius_server.py",
+ "name": "plugins/action/dataconnect_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4d6e3bb3023b33797f53367f96ebc7ae5c99659bc6d50546ee2a8714778cf951",
+ "chksum_sha256": "13ed05d46bc6d8a554c4118e01188caac059f872da15d5661564847413402e76",
"format": 1
},
{
@@ -2769,7 +2762,7 @@
"name": "plugins/plugin_utils/ise.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c0e405eeb0a613d0257478f01603205b4c42bc113c93d8088694559ad9a544c6",
+ "chksum_sha256": "75af06fa992137e1506d5daba3fe7da1eda9c590fb4190294af256782ee78a60",
"format": 1
},
{
@@ -2783,7 +2776,7 @@
"name": "plugins/plugin_utils/personas_utils.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bd19138b6807f973e873decdc94446228cd8e49651319c300711abb9612ab54d",
+ "chksum_sha256": "92167abd40765c98163084345b5818bdb044a6c7e76eba8dc245aa180f6f71ac",
"format": 1
},
{
@@ -2797,189 +2790,196 @@
"name": "plugins/modules/device_administration_local_exception_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd93a450ed4c82219197d89207f2132e8e77a0a52ddf5de7b0e06cac030b48e1",
+ "chksum_sha256": "09ae30cafdfdaedff939f4b2c930cb542fd43b4561624277d409aae46157f7a7",
"format": 1
},
{
"name": "plugins/modules/device_administration_dictionary_attributes_authentication_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4f8a541b5e5d37ba6844d899a47c379839e02bd504e46b6b7bbeb94df169d1e1",
+ "chksum_sha256": "8476e48894a7656205fc78df7eac32ab88ea67689b3f93062dc5b23c018e0461",
"format": 1
},
{
"name": "plugins/modules/licensing_tier_state_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bfffb406833cdb990b7affdd5caac902255fffa6b5a691bf493b5bc8b7126b40",
+ "chksum_sha256": "63fb977d105ee74a82916f0ba2298cab112a91c126b43ec2f6eac8031c20bbd5",
"format": 1
},
{
"name": "plugins/modules/trusted_certificate_export_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4c833ab8c0fcf68d4c63a3c610bebbea6729c475a7acd9c023a02f104dda48a1",
+ "chksum_sha256": "7005a773193d4c2af2306f641b10c106f205a563ef5903cce77353726b7bc080",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/test_connector.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "f8765f75d2dc3d2e7b12bdbcca138d78e63c90b4d47ddcdd969eccbded3bb6b6",
"format": 1
},
{
"name": "plugins/modules/network_device_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c08356fb8ca42672775f2ec7321ccb2e5ef5c7d5933aa501c917f698f756aa29",
+ "chksum_sha256": "f2fe4359fc0c23d30519fb22b73700330ca25377e18153339c591d3cc17bca54",
"format": 1
},
{
"name": "plugins/modules/sxp_connections.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "91b635df49ece1ccb9025ede6e2ca8d01b2c0f4d80724c6a72bbcbfe2e755b2c",
+ "chksum_sha256": "7a3c087ea9a964262bc9c18b16b592536c2ac56a76ce8c20b48a7157ef166cac",
"format": 1
},
{
"name": "plugins/modules/guest_ssid.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d14cc33cbe8ef579fe6b0a30d4bb6ab25e6c5e0998edfb985a86b9764dee75ec",
+ "chksum_sha256": "dede565f2ffb62d09f9bfecc241cf110f74ea4cfb5d36fc89059dc9c9b66653a",
"format": 1
},
{
"name": "plugins/modules/proxy_connection_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "827ca614c3ea7998776b3ea2d41e964283fa78a30b55a7c313b57553ff5bda75",
+ "chksum_sha256": "1cbb52e38a4f8e52c5fe3f7cd05370657404d99ee22c4f662fafaa68797251d5",
"format": 1
},
{
"name": "plugins/modules/node_services_profiler_probe_config.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b2470934fb64265903b9da572adcdbce3bc23631f94e4bb9d1123ea80b66ca17",
+ "chksum_sha256": "d2f4e2aaef44e1310805589382a1ea7f3c6d93ee2c0b6ed322428fb520455257",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "31a8471b2d054bb0e0c95458979d4274454ce4d6aea28334d2929b53448b935f",
+ "chksum_sha256": "d69bb851277d9e75a8b93c8ce1dd8c578e6118526abe491a8c6f22c898a764c1",
"format": 1
},
{
"name": "plugins/modules/network_access_policy_set.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "07133d0d907844424ac2424c8f267ed766a21d3e9914424377f24f52d12166a2",
+ "chksum_sha256": "5713ef3d393066e493d3c87cc9a719c7d16551a1b835b341ea811f977f7c1888",
"format": 1
},
{
"name": "plugins/modules/repository_files_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bc0c93832ee5281983e9c2ac33526c4ef4a09c3ff8c1f3ad111dc64a9bc5f776",
+ "chksum_sha256": "081546c6c87db20ca51c38d82b012ba8b1bd5070cf652e0d69e9f5a2ab078a2a",
"format": 1
},
{
"name": "plugins/modules/repository_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9f83ea969e2bc7588774f2f105702178a805cdf042f238eeea04d8f77d6f6561",
+ "chksum_sha256": "1703f4d06378c7020d3f94421a47556b13dbd7cea9941f7f679b81c8d1e83fb9",
"format": 1
},
{
"name": "plugins/modules/rest_id_store_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "589aff070e5ff8a48fa825007336a334e90e8dcc34fc347536b20acb93f5b427",
+ "chksum_sha256": "14b572f096432cf70b51d5baaf706e6d0ba28d86820ea8703dfe5132862561ea",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/dictionary_references_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "be0b8b39394faa8fcec5576e32b80f640b9226d8f7e07a9c010edd60df55a206",
"format": 1
},
{
"name": "plugins/modules/anc_policy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "12c43a6a8e272132ae3ad78e0d3ab6e61329183cf702baf86d4bb338d2614439",
+ "chksum_sha256": "294257a71721b5d974d429af6b3ddff783885fcca6330621af88d5db6fb37d33",
"format": 1
},
{
"name": "plugins/modules/tasks_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "01df1458233357384e707d8ec7fead62aedd5f29e0b112b7e54e476f8acb419e",
+ "chksum_sha256": "9867e0e226170cae411c75ec11449a512ec0bb13a344affdf4759217f3e2b1ed",
"format": 1
},
{
- "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py",
+ "name": "plugins/modules/configuration.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "57713f5a8bbf4f91ead662e29a14616593e05bb92e5f0f07aab0dea77f816ac5",
+ "chksum_sha256": "716c2d97dfa29982d894ed7b6eed49df77788bf629c12ad17d54b4bd91d2dd9e",
"format": 1
},
{
"name": "plugins/modules/device_administration_authorization_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "94101b0bb67ef72bd66a20219c98990a35c9405630f6a12354a95d02612a1fd7",
+ "chksum_sha256": "739ecce2426b8e3de909cfc839fd96205bee964536e62f493becded908ca8eb9",
"format": 1
},
{
"name": "plugins/modules/guest_user_email.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fb0593d16d9dc392c4844ab4ca74f58b10620e7bd3f2080f080ebacc8b63f0c6",
+ "chksum_sha256": "d7d89a26275bc421969561f4dad11a78b569337f49dce8582fcc3eaf213dff98",
"format": 1
},
{
"name": "plugins/modules/node_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "50086a9fba86b29a502087a937630c2c065612b6b2b9af57eb5f2ff988c57c0b",
+ "chksum_sha256": "6999a49500155c2bb7f46c35c615249636e24b590b584fe9a2a1e0eff1826d44",
"format": 1
},
{
"name": "plugins/modules/mnt_authentication_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bc7d58ec6a7e14b3f2226f47017150aa07f0e62b22602e860d9822a596d03e1b",
+ "chksum_sha256": "7f0681c527c0536669cdfe189906f1a0d50b956ed7d2c62d5ab09a5bd1d164eb",
"format": 1
},
{
"name": "plugins/modules/pxgrid_healths_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8459e8f9eaf4267edcaa471b84f75efb5088cbee5845fb4eb4492469967327d0",
+ "chksum_sha256": "5ccba2e9d5158dfea68ed16f7a88d20ee607adb1230f571d405aef297ec72331",
"format": 1
},
{
"name": "plugins/modules/hotspot_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "70f186956cdd198610940bcb993fdfda0c03880e4d8af5db2d6efbc50ac1b43f",
+ "chksum_sha256": "3faf22154e3697a6747b9a125c97715d01acc6ec9f68075b41dac7ac3e2f411e",
"format": 1
},
{
"name": "plugins/modules/authorization_profile_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b0210a68b996a7b751ca7999878855a017d74f0f7736107a4c1fd53939a41258",
+ "chksum_sha256": "9313dad0b5059a1248e29e1f6e7c8e85c1295fc1b078a7770380c24fce5c7a88",
"format": 1
},
{
"name": "plugins/modules/hotpatch_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a72be29edaeecbc7e09221722c394515b2d262f7eb2727e56cfe1fc4a5ae52dd",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_update.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b059b7fc449b96efb38c563c90109c4865ae174bd375aea27e32bd8e86aa1b19",
+ "chksum_sha256": "0e2c05a9c3a3d0202f0cd9b6b5388815a7021c6caed8bf7237ef7569bd93b03d",
"format": 1
},
{
"name": "plugins/modules/node_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "51ae4964b15cb06c554915625a86fcb299aa5b624f3aa434f11e165216ffe393",
+ "chksum_sha256": "882b934437c291fb9fad34742acf7dc90fc37d4b3eb026dfb42f30b1457acf50",
"format": 1
},
{
@@ -2993,679 +2993,686 @@
"name": "plugins/modules/network_access_dictionary_attributes_authentication_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "556c8bba1442f43abbf15923a0aa4b17fce3d79fab47f0e0d9446f6a986e03ab",
+ "chksum_sha256": "d6c304ee66b0e51c1a3cb95d4a387df3347fc8d34c22b28a8d065a9d79db8674",
"format": 1
},
{
"name": "plugins/modules/aci_bindings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5bb2e4b3a3a3de54adbef35dd70bb24bb920c601e891545bd26a4acab9fc9228",
+ "chksum_sha256": "d00714589a5f15f66f45f8f448144376d3ee8b7fe585909ac7ab35c3ecf49f5d",
"format": 1
},
{
"name": "plugins/modules/network_access_policy_set_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b4c2e4b214cca276256b002f3caca84d9368d9e9609e2b6bf92231c6edeee20b",
+ "chksum_sha256": "8bbef6ddcd1b4622b2a97d7c18e1b0b1f9f9a8e160fbb3a4c5dfde4688b6dfbe",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/subscriber_imsi_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "b2ce392430ce97f2daa5d4246e2ea99d9f32b6eef1a962bb8a448f4cd021cc8d",
"format": 1
},
{
"name": "plugins/modules/id_store_sequence_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "458ad7b7a5bb52d71c0ea96d6465906e21d9156048bc1f7967353a6e7a0605fa",
+ "chksum_sha256": "f493269344feb6a4033def5c0e6d0c3c4d440463b9c19f8ae7a79fb8bcdd7cc9",
"format": 1
},
{
"name": "plugins/modules/device_administration_policy_set_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7d89a2d4b3539a0bbcbf8a3d45da976531c2a77636a62e79d54e469203e8978e",
+ "chksum_sha256": "b82251d9ce28fdee92a44b24606c72313b90ecd377fbb823d528d6fe3bea1a91",
"format": 1
},
{
"name": "plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "376b5bbf25dd32d0a60a187f72d7543fbc5a9a02b8cb08f2f8abca804cd3059c",
+ "chksum_sha256": "35d00be52dbc47268c254ab700bf84d859dc92df667f1b07c62ef68fbb6d4c98",
"format": 1
},
{
"name": "plugins/modules/ise_root_ca_regenerate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ff8968901018a0fa903611b159ec530aa3e495d8eb865e3ae4f5eaa8b3234bc5",
+ "chksum_sha256": "29bd7c7145a9160a485b567a58e97d06b0522f5f610c1efe2cfa9c4243b7bd69",
"format": 1
},
{
"name": "plugins/modules/mnt_sessions_by_session_id_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "913f9da62a824026a38772bb33734ba787d020521d1193701033e5a7fd71cf99",
+ "chksum_sha256": "2babc37c2aecaca3cea9206bd2f41f0495b3909a4e0a4ab631abd16766499212",
"format": 1
},
{
"name": "plugins/modules/network_access_service_name_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dd6ef73d8d5d0d18f8e008f10329937f814e7f98f6f68c43c16843b101c1bf87",
+ "chksum_sha256": "1b03b476ef2df82c065af8343f272c6b7d88d6853686afea82102e701f707a28",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/configuration_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "e29f02240b3d31ed366388e4cc75fc8da676e639a5cc925c342099a4b785a91e",
"format": 1
},
{
"name": "plugins/modules/guest_user_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1a2320f2950d194fc1150496ad5890374548a3ef969e142d8ddcd0b95e2d4f25",
+ "chksum_sha256": "69c182eddf6fa234727d6ed1e37ce07746e7fae7c88c4a29c4f39895ca39ad2e",
"format": 1
},
{
"name": "plugins/modules/aci_settings.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4c100ebc7bc35d13ee60f2803f9435293c1f51c1a6d9418983b3a967fb4b44bd",
+ "chksum_sha256": "2586669093619adb07848595b89811aa8954a4cb8c052cde2a31e2c840b9dad3",
"format": 1
},
{
"name": "plugins/modules/bind_signed_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e747c8033549c22e58bc4cdaf83504de923751cf49fc6cd78a14602e2166217a",
+ "chksum_sha256": "2e29bbdf7db56a3801a7bc49509dd30c59a99d31d19c3ed34868258d29f63ecf",
"format": 1
},
{
"name": "plugins/modules/endpoint_register.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2463eca19297eec5d502a218d9beb81f490841c1a749b0c753788825f3688fa6",
+ "chksum_sha256": "9f49a5222503a73a905aa489517c5d5c2c4d42c8fcefbb41418731eaed3cd6ac",
"format": 1
},
{
"name": "plugins/modules/px_grid_node_delete.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e38208e1c96c0ae847fae729f993653488edb0ea464590b4d7782ec9cfdef100",
+ "chksum_sha256": "2a784dc14d4e256ae046acae41a8aac1e00e3a35365eb7f3358137695cb4a717",
"format": 1
},
{
"name": "plugins/modules/device_administration_network_conditions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1039d4575c88bdd8200b91852593ec2e153e7836fcc895c31e28eca803056623",
+ "chksum_sha256": "39d47ee06a7c2bb9464fb4ce8c3c509010ec682b82fd5d7b8fe172a0dae90802",
"format": 1
},
{
"name": "plugins/modules/node_primary_to_standalone.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ebaa4955ed9ce00b28ec896ef222a2cceb27b4017a5a76df3523b488e2daf084",
+ "chksum_sha256": "9aeee0804d23f71e8228af812a2ba0be44719e1d81c6324fb88805a4be56f540",
"format": 1
},
{
"name": "plugins/modules/active_directory_leave_domain_with_all_nodes.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cdf07f79c47d797f867c7c30a10266b0851861148d71877d604daa52ad7fc9e0",
+ "chksum_sha256": "748402df727ade75ccb80cd8dc5184c585428649b88a6bdac12f5a1910c115f5",
"format": 1
},
{
"name": "plugins/modules/trusted_certificate_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f2e7031163dc3bd54c848b95e752240df2f106004e9c1680b426e9bcd4db5a5f",
+ "chksum_sha256": "7866b5a7c01dfacb8500b37a6c9fefabac57fe53e1cca6c4c5269320371b33d2",
"format": 1
},
{
"name": "plugins/modules/licensing_connection_type_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bb2042bdc2857f1afd688418d7928bf0663184bb052c4662eb2d2ef04870d5bb",
+ "chksum_sha256": "bdcd9d2705e8a2100da6cb81ff01e381f000ff3eb60273e7970d656ae0170861",
"format": 1
},
{
"name": "plugins/modules/mnt_account_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2b3f7008587617cefddd9f95e59c95f09b04aca25f7248d5decfaf64c4d66f89",
+ "chksum_sha256": "c4fc3f6fccf8aa815b68914c5fa073ade60fc06c84586aae609557e5620905a6",
"format": 1
},
{
- "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_create.py",
+ "name": "plugins/modules/node_deployment_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "37692774bc29df34cc5283f763564329e5f71d82bb3d8157eed3544387f63f89",
+ "chksum_sha256": "166ab9970563ba3d6d8de08f901e34d08dd445d242ea31b4c518d9f135610b79",
"format": 1
},
{
- "name": "plugins/modules/node_deployment_info.py",
+ "name": "plugins/modules/subscriber_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2ea492310812029c67d5356e5ca9ffb3a79c76642f3175d26f875bd6a30ea631",
+ "chksum_sha256": "92c9e14e1f6a087757a766e596ed0e5cb6a94189257fb7e9d0c216d3dc096ce9",
"format": 1
},
{
"name": "plugins/modules/pxgrid_failures_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "483afc6402c46fc33996a910b4b7805f46fdf4066942a15e470d50c1cc8a7829",
+ "chksum_sha256": "ec85b40aede2c5c985ff8f3b5795d207112c65c6c6675fdf9f9143c7e0211988",
"format": 1
},
{
"name": "plugins/modules/network_access_global_exception_rules_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9eabb08195779085b7a42eb272539e8510e4161a8a0afceeafae24e1d4602b71",
+ "chksum_sha256": "d6596b2bc770e1e393410b9d91a510e529a71caef529e88d0ca102e244c98b5a",
"format": 1
},
{
"name": "plugins/modules/device_administration_conditions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a5913d58cda6ab4c401a57d4270d4cedfdce6712304a1bd3296fa276625d9954",
+ "chksum_sha256": "92c92206e422eb46973b3b0d0d1b6a1994732b6a4f305e91d1d0843435242c59",
"format": 1
},
{
"name": "plugins/modules/pxgrid_security_group_acls_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "438634f030988f75af1421d4800117af0754906cfb541291f37ebe934d6981eb",
+ "chksum_sha256": "c5e496a8ed7524abbfa731d8cbb265303e5bd353e64b6d546eb024691400a827",
"format": 1
},
{
"name": "plugins/modules/guest_user_deny.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5be796345445bca15c3d5de041eb41bfc40051c2a83cdbddae42bc15bc7a07e3",
+ "chksum_sha256": "ccc7be67ebbae53ee7a9cec8e343351ebf128407dda3c44c793d55dbe3ccd8c6",
"format": 1
},
{
"name": "plugins/modules/admin_user_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0739bfdfc85cb2b8e57d86ee1bebcb843d2e7d44833b62dc326595b97f32ed20",
+ "chksum_sha256": "6ae8b4f80470b4fbb690374441da5eb486a6df30f1d805df753b62ee8131fbdb",
"format": 1
},
{
"name": "plugins/modules/endpoint_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "779bea3e84c3bdd276578bcb21bf2008cc5bb7e8d9b7272320a2a6a3d82a50b9",
+ "chksum_sha256": "7234182a4d90dfcc8d61e69cee62087dd92fa001e0dea6e222da1aad0515d065",
"format": 1
},
{
"name": "plugins/modules/threat_vulnerabilities_clear.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b1b78c6e0637da65461d53a162ac679f48e494639315e498aa0106f60a2ea88b",
+ "chksum_sha256": "b5a65e21240cbdef08c72c22f3fc38024fdf2872157bafb8c9d052d4cd9723e2",
"format": 1
},
{
"name": "plugins/modules/identity_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7ca16a1ed5af1052f783c719afdec52f1358e5b66afb7eda81a87edf6183486b",
+ "chksum_sha256": "a7c579389a51f5895c6834b9bc58a1a6078a63c8f56838e40eaec496788c00de",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary_attribute_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "87cee119651b150dcc94995c638e9a21d2f9c885a906bea85bc65cde55bfa1ab",
+ "chksum_sha256": "f70a53a10f74a5f5c4018edbdaf4ddd5cecad5afa3d9912badbbe38f607d5bae",
"format": 1
},
{
"name": "plugins/modules/sxp_vpns_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "28fddaf0fe9e77b723ac658aad6a753ca75bbbe64bc7a1b6956273b1915212ce",
+ "chksum_sha256": "8f365397225b9fbe923f97d2e7fdf2424d880079c1c39e7432b79fbaef99a315",
"format": 1
},
{
"name": "plugins/modules/network_access_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4ccbf33367d65985ca8cd1c3ccaefd64bb31832d0091e5648b14eec384127334",
+ "chksum_sha256": "9c71c394baee493813c269df1b56c4c7266cb66f8e9e01765c088ca17af0dc0a",
"format": 1
},
{
"name": "plugins/modules/certificate_profile.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d28a1d181510c4204aa7a74fa469692e6736dd08e6b2ff1be0838e57c9b9d7fc",
+ "chksum_sha256": "1a60ddf2d4e06b73c26a3fd67fcc0ea49f5a1a7204d31dcaf11d7a84b1b5dc32",
"format": 1
},
{
"name": "plugins/modules/pxgrid_settings_auto_approve.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd3ffc502482f3bf375cea9c621f2e975855ff3da1d7e349af1b17fe5e54b525",
+ "chksum_sha256": "c71ffca5fee2bf40c945757640205103b8a8dc10244255639f32980d363c996a",
"format": 1
},
{
"name": "plugins/modules/guest_location_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "56308ecacf00177f3906a2c601bb78eb3512ddda46ee7c59a50c522e371d2c0e",
+ "chksum_sha256": "7524ac95d885e8cd03250c3559cf2d7e27f680de671e8735eb8ce273e8f65bd6",
"format": 1
},
{
"name": "plugins/modules/native_supplicant_profile_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7ba584fd541b648080867daeb491ae0348cb999521d6face6f29d6838d9cfe21",
+ "chksum_sha256": "c105f24de5e238f0d2d6e67d977fb7aea951d4d846100f071b07045c08a9a15e",
"format": 1
},
{
"name": "plugins/modules/device_administration_dictionary_attributes_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "194abcbc38160d3105ce399f031ef324abbe277bb89118142e3f87eaae2bada9",
+ "chksum_sha256": "08d859de5c2944ba7ccabf2605e0d1cc7bc560fa3f0bba947593c8a9bebce930",
"format": 1
},
{
"name": "plugins/modules/network_access_conditions_for_authentication_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "60e25c378a846db0e5145b21b479d0a3a9210e223e97dd4a25dd22dea5b8731e",
+ "chksum_sha256": "990e98e15ed154a9a30a89853ea49931719f6d53ea6c8c67194a94ee81fc52a9",
"format": 1
},
{
"name": "plugins/modules/mnt_version_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8853a605abb1e8fac87bf04b08162109892fea5b6435641206b670bc741378cd",
+ "chksum_sha256": "c673c5c9cc1e42b94130c122a68dc8537483da2cd9d497f0e5aa18c667d03059",
"format": 1
},
{
"name": "plugins/modules/sponsor_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "256912dc4f06d2d2de0ea1c8825b9d64abeaa28e6fd5fd890603be3c2463e8ad",
+ "chksum_sha256": "440830d53446c8e995da69cbe9b1321ee5fe90a3fbb56800020dfecf5a792f64",
"format": 1
},
{
"name": "plugins/modules/device_administration_local_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fa4f5517199c01813db4689ba5352cba4b3754f95381c12c87054ee6a3d9f63f",
+ "chksum_sha256": "49552d90f4c02e903bdf3d927bb4a14ea72cecea862ea4d391d666aca92c5122",
"format": 1
},
{
"name": "plugins/modules/system_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "09346329a322219835d44aa88098f3ab53d4d2277331a660d393df536327ba96",
+ "chksum_sha256": "13d091928dc59c166119864b976ab912927180878d62b21113269b6fc8e2921e",
"format": 1
},
{
"name": "plugins/modules/pxgrid_bindings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "71a092f54e16d1d216d460bf7b0bbe1a227a78c34146a9020582a0952dd82fc7",
+ "chksum_sha256": "a44b764670fd210b48bca6484acd60bc1ba75962bd9a863001199aab9ac2d879",
"format": 1
},
{
"name": "plugins/modules/tacacs_profile.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "86cbde22b6470f0df1a41607be0b4dda194a16658e525f1d5eaeba1a8d06540b",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_nbar_app_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "1fc537a4c714b51719caedbcca158512465af3b8fdd3c39841fd15c4759cf5f4",
+ "chksum_sha256": "24632d1746e614d367f8830fb90e54e811f170bbe72f142846e2353acec6d138",
"format": 1
},
{
"name": "plugins/modules/tacacs_server_sequence.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6ba70260e422c7e0983b636a9c780696a93e2517111acba3c546f98c5792df8d",
+ "chksum_sha256": "5cf7cec337806216ce8d2095ac7bde8ef3efba1ff1b449a0076d305f63cab5e5",
"format": 1
},
{
"name": "plugins/modules/network_access_global_exception_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e47917a594471c7c6b88b62bf6b3017862c77bfbc561714544da11c213b3ba54",
+ "chksum_sha256": "da1584ca3b1a9fd0308554c2726cea2d838cbc3ae42289de3657227c6033ca5e",
"format": 1
},
{
"name": "plugins/modules/mnt_session_profiler_count_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "07650b64d85aa5be715c6e74ea31ce2f9d60e67a65e9b91ae4605a8c1cc44ae3",
+ "chksum_sha256": "a981bc86da64317d0fb2e5e92d9e8c0390469061923274cdc6359975c707b3fe",
"format": 1
},
{
"name": "plugins/modules/external_radius_server_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fa2e4ad5fc661f64b0613e567e874dade59d3bb5b76ea30bbf9e22fd3e68c72b",
+ "chksum_sha256": "814af5eea5adedaf71567040fe7b0868aa1148430395c8cb73efd3d89bc21e2a",
"format": 1
},
{
"name": "plugins/modules/session_service_node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1d93805c8a2a797fe52631e40782a0cd291d69c233721d4696bd22c5f5a4b648",
+ "chksum_sha256": "285305471b4e4b424bf55002cb53b29582264c933c9eeae0a683823e81732c67",
"format": 1
},
{
"name": "plugins/modules/network_access_global_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4d0bc057cc50987a981d7c8d8511ad9905934cd0d50d26e6af4e5eedf679d5d9",
+ "chksum_sha256": "8b8ec79d4392452c1091d30cfa2d5a58866a38b876094aa4923f12c7bc801b88",
"format": 1
},
{
"name": "plugins/modules/sxp_local_bindings_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1f1fc26c823085aa5b22000e5de2f18d2f4abbd0d29b5ed7a0fe11323fe8f227",
+ "chksum_sha256": "bf6e0e53c061a0c1808d77e85e0eefe546b5524fd5b62d2b7e670e13140f217d",
"format": 1
},
{
"name": "plugins/modules/pxgrid_performances_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0ca45d9f02175c5f1755404d8da9067437dc798eacc54b28a2449e8ad84b6467",
+ "chksum_sha256": "efeeb776fe85cea5921d284fd296181f0ed12a607b5fc3f6fbe7ea6a40a348e7",
"format": 1
},
{
"name": "plugins/modules/csr_generate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1e259d3c220828286972baec0335420570bd0f0db22a5245161af5b3f63562a3",
+ "chksum_sha256": "119d441b532c45269469923f9bceb3fdadc23c8ea96b126ec40cb0663ee282fe",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/dataconnect_settings_password.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "de0cee6f0f7dafbf1064c2a527765ce3c6ca9238d096763b08bfac161d45d79b",
"format": 1
},
{
"name": "plugins/modules/pan_ha_update.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6c3bc9315f4e24c04b4d25a47f569f198ece4a544d880554d9a1b5142f0728e2",
+ "chksum_sha256": "7704e611ac6a19e9ff118adeec6d3a1eb46c3d1e8dd4597b87190c8215a73a3e",
"format": 1
},
{
"name": "plugins/modules/mnt_session_by_username_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bac35d8da50b380b9c38c876cd755e4b49aa7825fe1f36d326d0fb5f5393315e",
+ "chksum_sha256": "cbab19d5b0c29f5ef2b89a86ee72ba8b2992ef1ecfba05a79a4eb5a0df197cba",
"format": 1
},
{
"name": "plugins/modules/network_access_time_date_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "05ee39da892ef246a61132a96c9c25925aea434beea86ab179dea97b5529e35a",
+ "chksum_sha256": "512c68e0c3177570b77d3ec64c88ed2f317d36b1e628ab5de3ac474c2097b660",
"format": 1
},
{
"name": "plugins/modules/device_administration_time_date_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dba84210c28dd6e953edc706be580164a3037118cb85472b3aaa891338340f66",
+ "chksum_sha256": "cef7f7b1bb08dfbcfafd73b3503eed875821ba10e5bfa7b10cbc9bd162e3b89d",
"format": 1
},
{
"name": "plugins/modules/byod_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ae42e1aa097b8f8a4493d36fd2dc3765371d213b3a9696f43290ff90fca16660",
+ "chksum_sha256": "4da7335799d04544ba7edc2a85772d5b098293ae6c7c88cfe43a6bb25a299ac5",
"format": 1
},
{
"name": "plugins/modules/node_services_interfaces_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a2263c7bfb1c81e045841b59c8be3ff074494600565386d0d22d261a9f1b387a",
+ "chksum_sha256": "178d0c64a801a7692df4bcae630a603bb9c4099c27ba763247d6f15c4e56b275",
"format": 1
},
{
"name": "plugins/modules/pxgrid_endpoints_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "663371e87b3b340bdb1c36511247da9bfbc0d7dbe41583aade88b8f6d865db1d",
+ "chksum_sha256": "72465579a8aeeeb2744940cf3d0c35a1b4960639d4cf2f1b44c4b1eac62e219e",
"format": 1
},
{
"name": "plugins/modules/portal_theme_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e6697828bbe45c603cf7931e30400743c37f47d48e625e01c4b5deb1217ed954",
+ "chksum_sha256": "8bcfbe78101b725e2e239015a34293ae387d65c87df63fd2dc2569c15b827077",
"format": 1
},
{
"name": "plugins/modules/guest_user_approve.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5a8cd93e088da9bffa035e977b3ccb60deba4d4a2fdfe22eaef28182ea0c4d72",
+ "chksum_sha256": "b3fae6c1c1d24e9c807f5a78354f84c35e75f4897a7d1fb3dc1a217dbde532ec",
"format": 1
},
{
"name": "plugins/modules/pxgrid_session_for_recovery_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "031d36bfb036be5320de10d98c16d6c7e33008e0794f280a20ee9f60bee26550",
+ "chksum_sha256": "334e6a36a312cd82103e3af41686ebe5fba1ff067e26ced5204bbb392bbe3d60",
"format": 1
},
{
"name": "plugins/modules/licensing_registration_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c68f7c71b9079632dedec44e0ca95a7ec7a573c63f04893f13b72e437d95074d",
+ "chksum_sha256": "9d6ba9ad31d635db24412aa750982fc42482821b3ee1acd6b3571f50757f02e7",
"format": 1
},
{
- "name": "plugins/modules/trustsec_sg_vn_mapping_info.py",
+ "name": "plugins/modules/tacacs_server_sequence_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "08da831e6623ad7af5165f16bc897afcdfc8a850e9961ac05ffd5dc8a09d769e",
+ "chksum_sha256": "82dbccd8a46ae6cbbe2894e54f9a0fe503c02ea351705ea7d079fe1125496505",
"format": 1
},
{
- "name": "plugins/modules/tacacs_server_sequence_info.py",
+ "name": "plugins/modules/sg_mapping_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d2c4208bbb1d7b973cf6fdc33ce729747b4c937e90acb20fdf0faf46c8a526b1",
+ "chksum_sha256": "54a0b58cf1763da689c16f4b2f3912bd0f3f6a96dfa1816d4b7a11e6cf8db529",
"format": 1
},
{
- "name": "plugins/modules/sg_mapping_group_info.py",
+ "name": "plugins/modules/dataconnect_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9b8258bde89556449361a2497362d3f8e0c553bc608e97547c507a6f7595e060",
+ "chksum_sha256": "69d5919d86041f3bf3d7f32ba6720c162e8165e0368b711cad9ede31058c1e2a",
"format": 1
},
{
"name": "plugins/modules/system_certificate_import.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e11880e51a2d9987109722d22f8f13451e765fcf6ce54662e64f18b9856aa48f",
+ "chksum_sha256": "dbac596ac6bb7456841a9591a69df3527e48bf82cf78feddf31c6500f0080c8e",
"format": 1
},
{
"name": "plugins/modules/mnt_failure_reasons_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1f135dfc43495d393632ccf47176c4fbaa3360964f798847305dc6b76d4e5ec2",
+ "chksum_sha256": "84366cea6d069a821d8cabcd550f5deb4af75df67baf7bbb35863199898bc69c",
"format": 1
},
{
"name": "plugins/modules/transport_gateway_settings.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e2e380ac9be33987bddd909443fc6702ce4700fe7fffc5293b63bbb583df56d",
+ "chksum_sha256": "1e40a2d87828b48159c32a5ab798f8ad6741dffe81257ce95f61ae09af4382e7",
"format": 1
},
{
"name": "plugins/modules/network_access_network_condition_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dfd129e16e4ba05068d90f484ce9ed2caf859b5e7f815ee630aa8c0e41b92cfc",
+ "chksum_sha256": "66e707026f332f82158fd2012fea22d24ff86f290aa599b532e4ef34e19a66ef",
"format": 1
},
{
"name": "plugins/modules/device_administration_authentication_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dff4275c25e6bb8f7ee5cdfee1f8f201e4e81298558ddd4634d1dc89e83b163c",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_sg_vn_mapping.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "610aa1a0787cf030796834fe3af5eccb0f22d5f40d1e77252d50a6009f77b938",
+ "chksum_sha256": "4b693e5505c39c7694e72e228aaff5af8f068f7537d2a35cc95e0f7725f7f8a1",
"format": 1
},
{
"name": "plugins/modules/backup_schedule_config_update.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "357bf0d242ed777e7363546216d4bedb5968600892c6d611bd7c7ac06965d44c",
+ "chksum_sha256": "c1f41bdce3c7fb3c2a82dd5b94eecbbbb0db53e1b4488fb76a9254d3b4a70205",
"format": 1
},
{
"name": "plugins/modules/network_access_authentication_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "355d410bc22bd81b99efecb6c20678b7f4ead0dbf84a331a83fb75a7da9a3cd6",
+ "chksum_sha256": "c6ac7edb1debc0ea05a61a364c0eb790fdb27778c30a201c0cf592b3e68a3ed5",
"format": 1
},
{
"name": "plugins/modules/anc_endpoint_apply.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "610a3766a851751fb4b5a79a45174bfcdadbe4d5aee73a2034dc01fd458dc4cf",
+ "chksum_sha256": "fe21680d72da158ac8b28a2f7b2bcea76d2870cf1c605cffc85ff70b5a43f8d2",
"format": 1
},
{
"name": "plugins/modules/endpoint_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9dfff43d202d777f11a89b9f33ac17ea4c534871c134afeb0384f38c5a1f407a",
+ "chksum_sha256": "a5062fb00b4ca90a7bd677004552a6672b14fc5773bba33d3c630ede90a3556b",
"format": 1
},
{
"name": "plugins/modules/guest_type_email.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a603bd3163dfc94d857d15f42607314d8b08a7ee6e1dbd3a26c447f192a5cae1",
+ "chksum_sha256": "e1b5094c48c7f68b9977588a1276f51fadd56d6653d5b03280a7c997af53526d",
"format": 1
},
{
"name": "plugins/modules/rest_id_store.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "afa850a75e857541099c42fda5f897ea5632d39498c92fee10e8a0d7cfbd3946",
+ "chksum_sha256": "6c89b2fb2ba44a7da3fca22b4f4c3fdf0157c2f4bdc16edd3fe76ffa6be486d0",
"format": 1
},
{
"name": "plugins/modules/licensing_registration_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "911be5530aa33b81670ec4c47e699926637d4aff3469c0f912350d1d1a7b6197",
+ "chksum_sha256": "8e143bbbd3bb0225a2cad0e7c00e00998173ced91eafbd034f1f0963f6efe509",
"format": 1
},
{
"name": "plugins/modules/my_device_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "22ebc4e7f1c4854338f1ed4a87f6dc45787436f76003c4c6f24132ddbb509632",
+ "chksum_sha256": "748f7fb5d09d5eb40a2b621298f0df711ade50999329a6b2b2e24625a98f081d",
"format": 1
},
{
"name": "plugins/modules/network_access_authorization_rules_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ced2a9fb89ddc436506a80dcbe7138cfd2e3124995b98dbe35ba7865c131aa69",
+ "chksum_sha256": "3cd0179101a1b1efbe61a53a7cb97799ed08e6880bc32d7cbfc89fcae7e98868",
"format": 1
},
{
"name": "plugins/modules/pxgrid_egress_matrices_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c88d13c05510957731477b64a1a22d37b57c71c5e6ea29ac47239c50c7885d76",
+ "chksum_sha256": "523b21b2be6cc6e4b690615bfa798b85049351b5d5485ac890f3df7abb97fa91",
"format": 1
},
{
"name": "plugins/modules/active_directory_join_domain.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5519e9b36a9b507840af2a2fe3509b632850abf3c4ec989b97ce2675b790eda7",
+ "chksum_sha256": "113d4c750156d522edd5bba6c030644d9e654e0ae5f04fa73eb39122fec4c032",
"format": 1
},
{
"name": "plugins/modules/device_administration_conditions_for_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bd302fa2d5f4cff42248ca4b601f62a0d69bb12a22ac75bbb7693adf6dbd2b6a",
+ "chksum_sha256": "2773bf27387c8d366320e3c5c77bbc980c9559ae372087c79dd483fc1896ed63",
"format": 1
},
{
"name": "plugins/modules/mnt_session_reauthentication_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "32f3d6671b467199034c9d5be512e4e16981ed9607da2e835fccd90312bcef04",
+ "chksum_sha256": "b2ce45b6bc3c47e65b3262807827399ca8ab390c71e1fdbd83f49559adc975fa",
"format": 1
},
{
"name": "plugins/modules/support_bundle.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b66fc0b8c2ef05feb406d90a98e72b2bca8cb1f10475dcf3085475a030ef7324",
+ "chksum_sha256": "4b8df8794ae6ef84a2e4ac025033160e625427d2e9abb6f77c35324ac5bec8c8",
"format": 1
},
{
"name": "plugins/modules/device_administration_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b13413a19b253f1da4d06a46a80aac94369bb25600f8dfac5379caccafdcb8ec",
+ "chksum_sha256": "a1a5863fb9eb462402511388a0c639b2439870103a278bfa5b6be90005608f70",
"format": 1
},
{
- "name": "plugins/modules/pxgrid_endpoints_by_os_type_info.py",
+ "name": "plugins/modules/subscriber.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2e44e36bc2a308fa54bbe23c62c0992fc9f945580ee820d5e1a8f782d5ed5390",
+ "chksum_sha256": "55c8d1822050944e73ee3ca1d8536fd57ebeab064bfd5881ce3a70877ed05d61",
"format": 1
},
{
- "name": "plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py",
+ "name": "plugins/modules/pxgrid_endpoints_by_os_type_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "be6943bd0c99164b1371cdced35bad64eacc68a9be0d2573bd732d6cc84a6bd9",
+ "chksum_sha256": "6879191201617c64df2ef196f44fdfacf4515e504659376dc61f252502eb6f45",
"format": 1
},
{
- "name": "plugins/modules/node_info.py",
+ "name": "plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "64b77748f796e25921594250ff990733e76c51f65d8ad92a4f22db11ddf38990",
+ "chksum_sha256": "fd3da0a71a6c9aa56fd691517a7e2006251b511f17563c09daceb3ce4be732da",
"format": 1
},
{
- "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py",
+ "name": "plugins/modules/node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f76a9b056fbd03296573d92317b16e6015850ca8a47fccefee5c0177c3866b23",
+ "chksum_sha256": "8522a08959d780c1a5ba51814ed143e40fddc75065bfba19ab0fc85260d31c58",
"format": 1
},
{
"name": "plugins/modules/licensing_smart_state_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "81a9686e65c89f6fc5d1e6a6665ad7ca963c95e8c78c9389789492b2ef330d2f",
+ "chksum_sha256": "07e975c845af65bf8c846b1fae10f3d86701964d7dd79561c194fae378ddd680",
"format": 1
},
{
"name": "plugins/modules/sxp_connections_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8abd8bc5c49d29dc6b9055860aac985a90fc6870be87d4e287f98fded7e1e8b8",
+ "chksum_sha256": "385d9ceff4cffac0ad5569b6c541cde80dc25ff8a5f513e90314d410e04af9f3",
"format": 1
},
{
@@ -3679,84 +3686,77 @@
"name": "plugins/modules/guest_user_sms.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9a4b6d5ef9bbe30a76828069318d12e7bbc8d5615f0b6956c376ac2f50e8f95a",
+ "chksum_sha256": "cf01c8ef62234046237fd016db6586ddc6f15e0bbef425b852ea87bd2ee093e4",
"format": 1
},
{
"name": "plugins/modules/pxgrid_user_groups_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2fdb846ef843f364fbe41a98991eb6e0d3e3186834ab06f163c2a7b5849640e7",
+ "chksum_sha256": "ebc990799cf775a81fa9103b042a5998d29072c602427c8225365136b3867b27",
"format": 1
},
{
"name": "plugins/modules/pxgrid_profiles_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fbbaa36d7fad3f921518aea5e513136ea17de20f72237f88e299913e1010127c",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "911609cac367e95dac4b8deabccbb4d14b8178190e3370707662801deb4c0edd",
+ "chksum_sha256": "63b60b03369e703b7e98ac8698d2dc8541674f4d10b96cbad4d28a955e6f2e9d",
"format": 1
},
{
"name": "plugins/modules/licensing_eval_license_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9c5d81662ef0e1fc4d71b41ae99062cd7254ada9e509e2cef94908cf6c27fee9",
+ "chksum_sha256": "092ad108df75727a6971b82fb7d1faae739f2df3480e3b19961e59fbc27abec5",
"format": 1
},
{
"name": "plugins/modules/guest_user_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "994ca00be10e15e7f6b1c71a3639b4f83507a951f8c6168607836f11497b3f0c",
+ "chksum_sha256": "2e7089d767d922a615f4317503f763dea12565f10c53e88b6f9e9dd1155a9c18",
"format": 1
},
{
"name": "plugins/modules/node_services_sxp_interfaces.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3a3a527747db94ff8c804200f767529519b2ace406a98c3ed3fece5b70226e88",
+ "chksum_sha256": "c1f9359b6fd1cfd0bbda6fe0b62db6f5d577c6bd0caff3e0d8e18cc5efb6aa59",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bc13cd394696d01c55656e8b00250d541736a534f5a648b9791aa5751d0b7637",
+ "chksum_sha256": "896fb1b8f2b0a354b94629f9f69fe4d56b72c90cb0dc66d0dc0cb8b5460f2d61",
"format": 1
},
{
"name": "plugins/modules/network_access_conditions_for_authorization_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "848b004b036120fbd6d687dfa381d0db88753e29c42844d04e6c361ebe0e6314",
+ "chksum_sha256": "f7f6808078748da83fbd3bf33193a980e16a478823ef26545bf8376fe4c513fa",
"format": 1
},
{
"name": "plugins/modules/network_access_identity_stores_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fff63eabd8fdd2ffd57dc8966504713a573ed44b30d3cfc7debc6ce506e4a884",
+ "chksum_sha256": "2bff7a962e88648ef38e6a5fc7e4e769d6546ab4bd5530bf229fae94fda7d0cf",
"format": 1
},
{
"name": "plugins/modules/pxgrid_account_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "59237c2be206ec01348faf847574abeef718adb1115a84338ce8a2796f7dd45b",
+ "chksum_sha256": "798828d1f1dea8ce271d0d85fac10ae88c58761ebd6d2b68e9654648df813ffe",
"format": 1
},
{
"name": "plugins/modules/pxgrid_access_secret.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9b0af3e95064e32b700298d466f522669130af2130b4e1402884daff2b05f590",
+ "chksum_sha256": "dac8bbd08f48b3dfeb5b2965cef8a570be1b03d56cb778c48d1c94bfe4929e5c",
"format": 1
},
{
@@ -3770,56 +3770,56 @@
"name": "plugins/modules/device_administration_authentication_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c9653358026069a2cdbdd10cea4c7fb4a79b4b2be1a5b9f059e2833e04902a67",
+ "chksum_sha256": "2216f1e10d9fc493239b212404de1152a8e93a5424e40781ec2c7bc99b3d419e",
"format": 1
},
{
"name": "plugins/modules/active_directory_is_user_member_of_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5c84638ade6c9d819a7b4bf85bc6bb6061029be4d7fa09f09eeff664feab9da0",
+ "chksum_sha256": "392340331831e8f57852bc3fe52fc67346b503b8014aacbbc5daf9b37e12a2f4",
"format": 1
},
{
"name": "plugins/modules/sms_provider_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "84c2dbad33998aa68d959fe8e859ee95133f1ec24a39eb1b0ddd0bd7a12d6001",
+ "chksum_sha256": "30e61a30963a7a6953ed62f1cd59222baacef3ba48d6116ed679213367c48626",
"format": 1
},
{
"name": "plugins/modules/sxp_local_bindings.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "66ef6885878cf7154e5e4e7fb8b54458447eeacb706732c27b470ef78823d8f9",
+ "chksum_sha256": "ab261305426b3606760af2e46fe6d00a84e943192bf2ad51e859904e12680fd8",
"format": 1
},
{
"name": "plugins/modules/aci_test_connectivity.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ff36b7dabc32e57cb7efaff225a158ce4632a8fc1456283f508f63ce18d5679b",
+ "chksum_sha256": "69b1406fcaffea2e9d7677bbf4f308bb16501522b18fdf4f4255c537d5375654",
"format": 1
},
{
"name": "plugins/modules/device_administration_identity_stores_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "eca8d2684177f28d15847e09bf024f42eb01de3b60de51d37b6fd03882409dac",
+ "chksum_sha256": "47fc19911d0f0cb5ef9d7339d2241caa26ed596e894bdd5bb69d6de031366ce7",
"format": 1
},
{
"name": "plugins/modules/id_store_sequence.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3748d088d7ab8d25e27863a2ec79206039e3430f19decf6a0d3d7454968ad3bf",
+ "chksum_sha256": "06a6d1fce26994757c7825ea6defbe0c29b653011e30a235afff1ce65136accf",
"format": 1
},
{
"name": "plugins/modules/sg_acl_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bb133bd2fd27a0a3071d4ae83d72a63e99584b4bcea54b6a8033cb4ebb7efa89",
+ "chksum_sha256": "3d36d21be01c91c21b52a0ea673b78b90e660cc3a883940e8cf1a9d6e948e721",
"format": 1
},
{
@@ -3833,98 +3833,84 @@
"name": "plugins/modules/pxgrid_egress_policies_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1916ba48da7234bc9b8ccd5f5af6e86cfcc575840c7bbdfca98f7f496a7654d5",
+ "chksum_sha256": "5d1def0e1c8170e585c9c59e841c35e8f51a917501ec0e719150066e29462832",
"format": 1
},
{
"name": "plugins/modules/anc_endpoint_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cea3eeda9790836208579368d7b7d5987d9f5d75cfb8911ef0fcb414e4675c18",
+ "chksum_sha256": "5d0ed60026d2b75683149dd72c08d85ce9c26ea28566c600a1a9c966e4731420",
"format": 1
},
{
"name": "plugins/modules/guest_user_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd5f608024bd7af70192899e874a180a90ea3cd36106b31bdc81fadd1563c7de",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_vlan_mapping.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3f06f4f5b60a3251ea046118605c3f68bfe3f13762a274fc037e5f3412630714",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "62afd7e9eeaabc2bcca6e81e9bfe1c97a47682f21a65756eb1d16464471feb49",
+ "chksum_sha256": "dc502233f4ebb19bd8baaf8ff496101371bebfb2174243d89140fc85baf8d501",
"format": 1
},
{
"name": "plugins/modules/sponsor_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "453ad3d3bc410394f03bb22bd31ec73c5a96aed9a5fa36baffe1d16133bac340",
+ "chksum_sha256": "95514c959d1472f12f379ae7fba7ba17bf369ba32c73538ccc0191d04e047056",
"format": 1
},
{
"name": "plugins/modules/system_certificate_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ba54dc996eaa125b09117eeb3e99c033be9b07db7baa4e53bfcec706edbbe429",
+ "chksum_sha256": "b891fbc93ccb6ffb7c1efcbd0b660689a9ed9555c42ec34ff43710c1a1d218f0",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary_attributes_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd1779e76da20881dbb26a4687169d340cae592878b939db5275d6f79517ab90",
+ "chksum_sha256": "02eb22fda74bfa91c4c6efc3cb5e34467020ec60d2f9a722d838e70269b4992c",
"format": 1
},
{
"name": "plugins/modules/px_grid_node_approve.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8725c1f9d3ef02b7dd34b34a9be3b59037ef3be81e7cb9c29e94e0f72e77cea9",
+ "chksum_sha256": "a460cbcfddbd6be09f3e917dc6b8a222204c846b94e3af6c49196b1e6a9f3064",
"format": 1
},
{
"name": "plugins/modules/device_administration_global_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7baa7a8eeccfe78b56c6c85e20e9db931c7656fd318b7e1aaaa38832d92da537",
+ "chksum_sha256": "89e67650f326e57f65431f863ce0c83116db2fc27aae9fe7107f88d16fba7ac3",
"format": 1
},
{
"name": "plugins/modules/sg_acl_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9d43f0399efd6a0310df283495b940af3fb0d335ba4bfa7c14ccf6cb142adb83",
+ "chksum_sha256": "73e37949c269a92d51118fba46c5aec3c01a4805ae11ecabf34dece0291a9da9",
"format": 1
},
{
"name": "plugins/modules/hotpatch_install.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "71a0a499a6106e011af26bf1fdf61581e19740b8ca29b244b88332643e9d2f70",
+ "chksum_sha256": "e3931a962d0425130321b383c1374c205b818f3862f434acb3e0582e2aa7ead5",
"format": 1
},
{
"name": "plugins/modules/active_directory_user_groups_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f9fe491f0aad3a590f466359db5bcc9b190abdd48e271d2eaf721c615ef2824f",
+ "chksum_sha256": "5ce0e60fe79af6b6d2ba5ee11f5f01bdd80b5292d7ad365dc16f7bb62ad9ad13",
"format": 1
},
{
"name": "plugins/modules/pxgrid_node_delete.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "51b1d3e5d694d3d2a85c722b4b7cc13d51e5b7e289384353a4295049824a2176",
+ "chksum_sha256": "67f1f80ae6dfc2f01981388e29aad05165795bc025532d0d4310dc8df83e63c5",
"format": 1
},
{
@@ -3935,38 +3921,31 @@
"format": 1
},
{
- "name": "plugins/modules/trustsec_vn.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "6e1d2a2d6a29d28cbee55f0afc55aed58aa9d7f11cd7795884969b8cf9268e73",
- "format": 1
- },
- {
"name": "plugins/modules/backup_last_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ab709a98a93f78fc7a8bf7a1176e4ff711e760cf5fc484f9fecb8777f4d36fc9",
+ "chksum_sha256": "7b78f418fa38d677084fb822fa2d09f118db3fad42e89258dd737ee7f5c7c048",
"format": 1
},
{
"name": "plugins/modules/deployment_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a6571a479e8007f5ba16a09064d1ff1d873f020c126d5683b1995cd922e4f87b",
+ "chksum_sha256": "d05249cd5e5409a1aa6e1b63570775c7ca533217bd6d5bdda3b946e9e870488a",
"format": 1
},
{
"name": "plugins/modules/sponsor_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2e2b7b7e249a4e30984673ee5cb38bb6ea17c4b1f2c55fd789ae773374db5c4d",
+ "chksum_sha256": "cafb343c491e9eccbf48d6910110ed8fa59990c51be6cc1792db13450417b03d",
"format": 1
},
{
"name": "plugins/modules/csr_delete.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a036c44cc51ce4f2998dd36de48c98c4354b688797573aaafa04a6d58bd137fc",
+ "chksum_sha256": "3d9cf9e7c183737edf91c9ce7c523af5271caa44838591b781887656c07e045e",
"format": 1
},
{
@@ -3980,1505 +3959,1505 @@
"name": "plugins/modules/pxgrid_session_by_ip_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0f06c8a3c290dd57be89e359f11f376ecc0eb4ba4fe361db036115cec4d6a0a9",
+ "chksum_sha256": "a2623aea5d62e93d061703884869a27d158912ac0669c22a9a7c42ef5a84df36",
"format": 1
},
{
"name": "plugins/modules/node_replication_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "053ede147e5a9ec8000057b51a9fc9e537fab9438aa734a0e5cab29ac2b99ac5",
+ "chksum_sha256": "9fa2e77980a669234911cbe0225449bb6f3a548e220624e44a1405d4014830aa",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7f560c323b6f821a130c2ebd077bbe33b2d793b30ec5f2df8c04779822f23b79",
+ "chksum_sha256": "6cbacde8df0e160ea8007fe5f926159b1af70194896e1fe93296cbc5f1fca3d4",
"format": 1
},
{
"name": "plugins/modules/guest_smtp_notification_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7fbb0a9b98dd32cc6458f797f269d3abab08c17147d413d48bdb2b691f8ca969",
+ "chksum_sha256": "a113c197beff41107c9522004d60993e53174c1b4193e56f8dbc7c09f4d2eb50",
"format": 1
},
{
"name": "plugins/modules/node_standalone_to_primary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9350b93054143f7ef3d7f9407821f977d34161be107fb916be92950f0d4d5276",
+ "chksum_sha256": "80e251a43c388dd7c921437dd4614161b0fc8da80ca73df2fe37e74c16cbd580",
"format": 1
},
{
"name": "plugins/modules/endpoint_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8f80ba889e76fa92504a40629dddf64fb708b58cb8ef9f9bfbc222218ebc3062",
+ "chksum_sha256": "a4bbd0ffcad1d1415e8c0c4a14fb246d1d4ab3b58dedcf3fe5ea39698817866a",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dfcf94f91f43988535678011d11c856be02c6e1489ed1c7e3bd2ab655d4eefb5",
+ "chksum_sha256": "bf6af349ea1a7235560bd8431a0c061bfda1f534f6bee96950f7b018a2a7170f",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell_set_all_status.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "005cc5a852a3adecb113cdd9eb9731c9e13aa6bb1ec07736bd8148134894b7e5",
+ "chksum_sha256": "8a29cee6650c646328b66ab750e3261551ec3ee3b3097f5c528e99d0f9caa733",
"format": 1
},
{
"name": "plugins/modules/pxgrid_node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fbfa20f843a959e4d2a66ed86d23d1ce8d8c35a2443b6e5b743defdb6c3eb4d2",
+ "chksum_sha256": "7fba508877c438c68f2092df4a7b4dcaec6dd510c266fc26372831ad6239724c",
"format": 1
},
{
"name": "plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e254d2eef610a8965a9b7cbabd902c4194e35a381a86ed18edfaab9fb5a627c8",
+ "chksum_sha256": "0e59d1c968814b6c0dab7d9233f0c2e26cb9c037f385ecda25290768ca8ae20f",
"format": 1
},
{
"name": "plugins/modules/trusted_certificate_import.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "952473bc6d97f0c21161b864f0123d12894575cbe33bad482ff3802fd614e208",
+ "chksum_sha256": "d74fc6796e27f3f666bf81f9f082491d902b36a56bbe234e050c3fdfcfcc030a",
"format": 1
},
{
"name": "plugins/modules/network_access_network_condition.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b4572a35271c07bb023493826b6968224dc9027dc5e2225d66bd07c0bfda6a6b",
+ "chksum_sha256": "a2c19331da2a9a784bdf4b80748b8b3ebf566b83e01c84aeed2b8f2fdccc24cc",
"format": 1
},
{
"name": "plugins/modules/device_administration_authorization_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "18b2049b455db48c1b5062df71f50f89e46f5b741689ebe873041d755b1b12ae",
+ "chksum_sha256": "1eb8aeeed5f6fb7ad12dd76b8b900a1515ac5988b115f7eea36d0b4367fb7717",
"format": 1
},
{
"name": "plugins/modules/backup_schedule_config.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "98bfd0422fd117ee0a7879ddb23af88d94cdf7af3508f45a163432333bc9e41e",
+ "chksum_sha256": "53f2f0cd988436f036b16318e7102e2d1ef51f91ab5482e703b3c4cabbd5a9df",
"format": 1
},
{
"name": "plugins/modules/pxgrid_session_by_mac_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c1da72c9b6ba5b0787aa206fc654329bbedd04b3665190efd557887a9e9e9586",
+ "chksum_sha256": "a390646559f4b45bd5ecf7dddd0a13c2c0bf68907a16a1276f3dcd6e019c2693",
"format": 1
},
{
"name": "plugins/modules/network_access_local_exception_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f66254716611d556c6a7c7acb843519a876563c5565972ee10e8817ae2ad0f37",
+ "chksum_sha256": "0e5a2bc4e2226a937203a521aa4ea6588725a67dc9440b39c281c3001b9a8feb",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ce82c1556f007b4bbeca20c233d0a3ae4cf01f58f55fd600aab68133a78faba0",
+ "chksum_sha256": "2c86a83f3f03df71b9a9f0ad23f5edefea91445259ba2f6a5610cd734242e2a1",
"format": 1
},
{
"name": "plugins/modules/network_access_security_groups_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "077c37b32e25e35871639b689c4c849a144374f45b11f440e242ae2d54b7c5cb",
+ "chksum_sha256": "132aea148538582861c38e7b7d828b6fddd1886760ba73f92db3bb004626a744",
"format": 1
},
{
"name": "plugins/modules/device_administration_global_exception_rules_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4c3b3d9e788bd3f4369ed7fdd02a6b04340ca2f0c69999d9aefdf44266518407",
+ "chksum_sha256": "599cb938596c3fd993c1a5c4e7374aa40f34410a25a68955cf714d09208c5016",
"format": 1
},
{
"name": "plugins/modules/device_administration_network_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e5e8117343c31a3f9b9eed1f516f33ddca5603c06df666c1b32be2dddf85dc12",
+ "chksum_sha256": "8884d0f1d01999a9ebbefd81a55f08b4ac3d35335293e9b860b2325c7600155e",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "01aa09dc88bf5243128a3ff9a0189604815890d8aadfe6256376ce38319a42fe",
+ "chksum_sha256": "be74a8e486006207c7a811f7578e76fb9e014bb60f3c71dbe4cb75ed7f5b800d",
"format": 1
},
{
"name": "plugins/modules/sponsored_guest_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "69c4ae7f7669cb849fa9141f77cda5d744f45ad90c8435f179effd6534301def",
+ "chksum_sha256": "eb7ed5d6de0033b9ac29ef3f0019d8641786e8035792643fed1cd1ab099d9dbe",
"format": 1
},
{
"name": "plugins/modules/node_group_node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "28ea18759009a4e32813a10796b15db25bc39ddbf99509f935ca10a61cf1e488",
+ "chksum_sha256": "750421162829c5ce10e54ca66917cec11cc3aceee353c541add40fc74fdc81d0",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group_deploy_all.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6fb29adf877b117741ca1445bfba07c94b027858148eb0f233bf4a5662ae0630",
+ "chksum_sha256": "465afd9c1280c55f7f866b93d62592363532329b4d29626f823ebf5aca4e02c3",
"format": 1
},
{
"name": "plugins/modules/mnt_session_disconnect_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2d4c14f15efa51502db2bea2da3a6be7334fe0079eae81e301d6aa11fd33ad41",
+ "chksum_sha256": "928b75e31e821d6d8f85eb19ba70d5fc9eb633d8a3d94e7f4b2a467a1f500b00",
"format": 1
},
{
"name": "plugins/modules/mnt_session_by_mac_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2d6f2f202fff113dd44f8fed3c9480cef3300c62c24fcc8ad4d77095524f4f8a",
+ "chksum_sha256": "3f838a5a43a4d49a1d8014bf910dc69bcf416ce65b018c8dc4f5493de6b4a987",
"format": 1
},
{
"name": "plugins/modules/aci_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6095a6450d0cb6f5571f5c63ad6df10ea7047f2ec6c8c6ba01ff203ca8035d70",
+ "chksum_sha256": "054f8da3aa7d75e80d6368e6291f65706b6018b3354f86a9d83dc394fdcd6264",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary_attribute.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0b4c39de1e8f7f8d979514fbdfa78fd79c81334ed097148efad5349ece835009",
+ "chksum_sha256": "64a7414da1cca2e1525d343b3023b413290ee5d0ba8cb0a18368517f502194c1",
"format": 1
},
{
"name": "plugins/modules/node_sync.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "352bf7762e19acb99ae4837f024161899c985162461dd813e52196a5f3a901b7",
+ "chksum_sha256": "ef27395f52d776aee8b2b1f16f5a1217ead7e25418668010c9741ce82793fb15",
"format": 1
},
{
"name": "plugins/modules/endpoint_get_rejected_endpoints_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6a57bf56d7a517ba5c0b6b02c767e380f9e544226ac76cba131875d59db01ecf",
+ "chksum_sha256": "ba9420c59d0d036c66b144beb2d2d9fb3b052a74c5351d5097b6158c3db1dcbb",
"format": 1
},
{
"name": "plugins/modules/anc_endpoint_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fa247d220b707e219881f4ce7667165f02f603943966b50bd038e34339587c71",
+ "chksum_sha256": "302241ea02e2aa8c92899a39fba5cd53584f99fbd6c8932eeea9fd718c2bc547",
"format": 1
},
{
"name": "plugins/modules/licensing_feature_to_tier_mapping_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "381c7fe17ee0b680f8a94de20e93d2038e5284321f1ef7c66430e32773d113db",
+ "chksum_sha256": "eed26481748e0b3999a12d26ae44d5ffc7fc59f584bd469b8b704ab9cc1ddcf6",
"format": 1
},
{
"name": "plugins/modules/mnt_session_by_nas_ip_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "adf77d487a5fe8cc21ce33080a517d9b9f64fdee0dbba05395ad3935d08da86c",
+ "chksum_sha256": "388f3cb3c7e525e0f9a66639be2b7bcf1185afd65aa505c787eb1c7fc3213e80",
"format": 1
},
{
"name": "plugins/modules/node_promotion.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "06ed5d878c6b26aae8ae3c2892b92793eddc28ea5df04a2f1a1648d4e4b27fa9",
+ "chksum_sha256": "99ec57d08a5609872dda46df7a131b37f5a13f4cc1e8bd60877c0bf1e1e61e9b",
"format": 1
},
{
"name": "plugins/modules/tacacs_command_sets.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "06cffe5d8593f0ca33b52d9c3fa6fa4bb71aed650519740854b0fec9e3f5488f",
+ "chksum_sha256": "0320dc2599e63a64fc094b258b0d31b03a5461173df251d592239b62034cca06",
"format": 1
},
{
"name": "plugins/modules/pxgrid_service_register.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1098f7204704211c5ff73cb1f676092a267501b9c87cde062a2b23e7a5551b17",
+ "chksum_sha256": "592f8d9ed04c8b3052fab71ffdace5bbd8e877785b8f7a976a0ca06ae52cafa0",
"format": 1
},
{
"name": "plugins/modules/guest_user.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "802dc4b55ea3bd1d0ec9a1297ad9dd4fac3332da8f75417aa2676907bd7a5524",
+ "chksum_sha256": "303a13936efbc79fdb335fe060e914b7642270bcab224de2408bb4491866a943",
"format": 1
},
{
"name": "plugins/modules/network_device_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f0d6a6dc289a318ab1b9f7b088bc717b384ba9443bd0267a2c3876109dfd8dfb",
+ "chksum_sha256": "0a6ae9cae466b24c6f89ed26beb98b96ae23c2006fa392fae57b35d8d21a7064",
"format": 1
},
{
"name": "plugins/modules/tacacs_external_servers.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cf9b0857e72ce3e98d86d088074bf6fe0319ce60fd9008e629a661ba73cd0deb",
+ "chksum_sha256": "6a2d34d1340291d32d7d0a75ffc349a9f373fea318f798577f1a9bc18af30459",
"format": 1
},
{
"name": "plugins/modules/proxy_connection_settings.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3a7695c64bef263a6af5b1aa53b2701776d2014256614de45572b25032c5a5ab",
+ "chksum_sha256": "9ee97d1c9e53a778ed5d7016a15e2476aa7be7dbb5881a9528a37434398a4ee2",
"format": 1
},
{
"name": "plugins/modules/pan_ha.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "413b1931fc7449b44f8928f28cb9696d0353d3b0e854f43fcc31825a94ad29c6",
+ "chksum_sha256": "e88ddf214d69522d4fa0f339857a5edf2645c642dfcf70985955d2f153bd0434",
"format": 1
},
{
"name": "plugins/modules/system_certificate_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "211715a20e9754d855649ad5128b0eb73abd078c9a0a8470e013d54e8932266e",
+ "chksum_sha256": "0879141fb1e747d2396e75a53c6b7578ee0313f96d3ec03da506f729f026b400",
"format": 1
},
{
"name": "plugins/modules/telemetry_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "12c51560a1f149cca83a91bc44da3cf916da95c3a02e65f8e2fc8d8b8215a3c2",
+ "chksum_sha256": "4e1e94af427bc360c5e2d7ab1b0318ff36e1330ae3e7a68ff15027798df198da",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_deploy_all.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9e025be0193dbdd9968dfea8cabc61f5075240404d2d999e6736adead4e58db5",
+ "chksum_sha256": "c9ffae7055a016b677ee64586fce1fba74e5cdeac39d2356c3c19b71d0615add",
"format": 1
},
{
"name": "plugins/modules/endpoint.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "699eb3e13bb65698898de83f0eaf22fd9068554065d5e14836124033eb1d49f9",
+ "chksum_sha256": "d3ca520ea3b391e222f10e3db2066dcc8aba9225fed6a6ed4cac9029dc5c83f0",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell_clear_all.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f35b3fe897776ccda928130ed36b1a3e300458e116690d93ff72c229548cc83f",
+ "chksum_sha256": "37c4a01ba9712458b187d4f7a2ebc8c1abafc59d35e46a821fe3c8289634ee34",
"format": 1
},
{
"name": "plugins/modules/endpoint_deregister.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e303164d9fe5ee06a34e62a53fce871a8c479d7e10fbb60324653450bc20ac6a",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_bulk_create.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "48bd3fc93d451c75292fb7f85e15d532f32d7afe717e5e507845bad142de6961",
+ "chksum_sha256": "a2ddca60a7917b948f22ff4b7c3e34ddc7230afa3bc2de39316461c83242463a",
"format": 1
},
{
"name": "plugins/modules/node_group_node_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "31da023b0a457ced3a88b43c42882c2f0f748e391fb2cbb7ae479dad4326fee7",
+ "chksum_sha256": "d0fc32454bf5e66f351919851ff14bae266323f9271e814b696fd41209f6b54d",
"format": 1
},
{
"name": "plugins/modules/system_config_version_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "97683e0e651acd5e209622a62b4fdbf013838f4d888bca1bbf03274cb44630ad",
+ "chksum_sha256": "85c283de9723c7cc0471b7deb9df5cc7619440ee0f864ce7b403e1b78541c7e8",
"format": 1
},
{
"name": "plugins/modules/downloadable_acl.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "26d63b7ad302a1d031fffe0e331cecafef417ad7fc0dc93ae09a145bba99ddc1",
+ "chksum_sha256": "88aebabd41e114775ba25632aa9d34fc806593b841dfaef2c6872ff44a473d53",
"format": 1
},
{
"name": "plugins/modules/csr_generate_intermediate_ca.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "539f18c21eabd2c451057b07e5bbb06e8719c7aa87b382d8a4805dca646408fe",
+ "chksum_sha256": "7043f73b25c85cec1b4c8871e4672ded7582652a405fa17c555af3f7a1fe0467",
"format": 1
},
{
"name": "plugins/modules/guest_ssid_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d8a88b859d84110411c6862724701b9a3b2eb88119d348bc3b1526c3b3591446",
+ "chksum_sha256": "df41e0151e33bbabaddc14dcb1ae54921f33897ca0725134d80e56622e36d6e9",
"format": 1
},
{
"name": "plugins/modules/anc_endpoint_clear.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "eaa73038fe135167b2e00adc434916318a04d3e52bdb1d660e962201d6db5d43",
+ "chksum_sha256": "eedc32e574d15d50f354af4ce5bb827a15d460ac00ebd605896edff86d9a41af",
"format": 1
},
{
"name": "plugins/modules/sxp_connections_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "31873c73845753e684f7cf14917fae616afd57a808ed0786d1ac286ca0c45e3d",
+ "chksum_sha256": "84e10a79b7ddd984af08aea91e7c67097dc2e0ff25e17a76fb9da3846c7b88b7",
"format": 1
},
{
"name": "plugins/modules/filter_policy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d48cc14fc5dfe0a12fbb4c9ab394f6ab3c1aa88d89b60ce58ed4c8c4666f989d",
+ "chksum_sha256": "5a4ee69d83504f63cb90cdede8343dfb6b6f123e104b3f3081ccb4de0b0aca10",
"format": 1
},
{
"name": "plugins/modules/px_grid_node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "db4cae3a3d80bec6ac08796a3e677bb74321e5416d439a3819cfdcab8f16e944",
+ "chksum_sha256": "e3174d034610bcbb566c84d5bdc9516bb2d645dd4dcd4da9b5a3b7e18647c2bf",
"format": 1
},
{
"name": "plugins/modules/internal_user.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f780bbf7849c2cc1bd824d325c5c63cd639abb41e075589437cba72144395a51",
+ "chksum_sha256": "decac83ce362739183afe6784a3fcb60598ed04b5e27395b5dbf000a84d6dd08",
"format": 1
},
{
"name": "plugins/modules/licensing_tier_state_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "23ed4210cdb2bc416f1a310f3f3e45ecd48e7b30b72fa48be9ab77352f3191c0",
+ "chksum_sha256": "61a3cb27c81ddd2b24e850d7f1a06d5f7aa4501311bdb0aa394e8a1657bc1d39",
"format": 1
},
{
"name": "plugins/modules/anc_policy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9e87209a5ea91e37577f3a0cad243f5ac90d25a9cf44f3ec8db4427eda171873",
+ "chksum_sha256": "fd48b6e6fa1adb5142c672481943c4595fbf0a7c19b685a02a34ba71346b1eac",
"format": 1
},
{
"name": "plugins/modules/device_administration_global_exception_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2cd1badfd87cf1b240a6441f8c3c0ab5356199932042655cc6d41de5d8bd0a47",
+ "chksum_sha256": "37f11866c9db5c493a42bf69b755bf6a75b0ebb9f1446a7e1cf1dc68ba24cd88",
"format": 1
},
{
"name": "plugins/modules/sgt_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9b7252c14e5d2edbf0de791395b29c314ff4a7124376552730b0eeec498b76de",
+ "chksum_sha256": "0314620f736cd3b52e5e0b0daa6cee1c5a4b81f4b4750db1014e15428ed7ff93",
"format": 1
},
{
"name": "plugins/modules/certificate_profile_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7fcbfc2963d579d0a8e248f6aa15cf4be125ef138499b6b91c32fc4f179bf4be",
+ "chksum_sha256": "854360af02395589593d7bcc70860f21668748ff4be0584b30c10e64fa3e3e8e",
"format": 1
},
{
"name": "plugins/modules/sg_acl_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7dbd65406f5e2d6bd9e6ae9235c2444545982af7f383b804fe2dc98d4aaac1c0",
+ "chksum_sha256": "85248ccb3dfa12c2d39bc9229b8330d38a0e20ed302adbd2e98e985909ea5204",
"format": 1
},
{
"name": "plugins/modules/patch_rollback.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5419c9b5ac7ff21e34a6e5f28ffc81e401b1cf03393bb1d351f6c9ee5e0d344b",
+ "chksum_sha256": "3233069812fd1b2216d3028928cb27cdebcb0967a8548d4f00fcc8e69a75ce98",
"format": 1
},
{
"name": "plugins/modules/anc_policy_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "898129165bd7d21d25c1a09562829949721a314e02b543beedb2efcbb02bba2f",
+ "chksum_sha256": "7436d0ef8ddf89f89c57783f432e793b3cc1e513ecf99d65f6eb16bead437643",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/dataconnect_settings_password_expiry.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "c66810eeecb2a946475a1bd433e0c281e060d2214b343d5feea2eb8a7879b14d",
"format": 1
},
{
"name": "plugins/modules/pxgrid_node_approve.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "00135c9545c4d1bc1d35d09083f71801e59f19b49a00eb23a69b21a374996000",
+ "chksum_sha256": "b06a5996f311f83bcd5dec8223fc1c7e2caf3ee1de058211280abf9b7b05ebc1",
"format": 1
},
{
"name": "plugins/modules/network_access_dictionary_attributes_authorization_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "451028ed51fca158ab151fd748590f141581d1fc0b1a51e7a64682d9aabeaac1",
+ "chksum_sha256": "3b627f20f6bf439ff07b4e4c164ba9de4d56f6f9f0718aa8a1e207e5107205de",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/connector_config_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "1b02dee83a5885f217e8b6f3eb36038c9b7ae92483e220d725878f580d8c4199",
"format": 1
},
{
"name": "plugins/modules/guest_user_reset_password.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9d41516e5bb4558377cd006d5cdeddbecea671f8bd0699582ad71f1f6dfd7d1a",
+ "chksum_sha256": "edd84d13bd4585b21bf8f2d3f22618a68f9a7382ff894375d55edae29276aea8",
"format": 1
},
{
"name": "plugins/modules/network_access_authorization_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3f79df75da41a9cdfde8b4ea8a235b92dd2057a2c09fe6c95c3d46bc833c6944",
+ "chksum_sha256": "c6c4c6eb914b018d631c7d8c2554d25dad66358fd4fcb7bea10e5aacf2afb04b",
"format": 1
},
{
"name": "plugins/modules/mnt_session_active_count_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6d05929816d0942e7da62e635e794e66ea8ec9f8443e79fc7998e8428a81164e",
+ "chksum_sha256": "51d442b3b9d20113be6251325fd453aaf74da8ad9a687b8b5071314aa504ef64",
"format": 1
},
{
"name": "plugins/modules/sxp_vpns_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "43bf4c7b772f598c200670d52af19e3b0bf21f50690d8faf2b2358e3bb0ed848",
+ "chksum_sha256": "d3f85081ffd0db6815dd8c437fa1804339a497695002f7a3dd38b4a739cf7d8c",
"format": 1
},
{
"name": "plugins/modules/portal_global_setting.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "290372e920cdeba83bd0d63cf2fbe6f64a1e1b01446e468dfd70bd6528587a59",
+ "chksum_sha256": "b54fc63fffdf5b95cb8d4b96b4f2eccc8342028595c39297387f4352c3b9b2ae",
"format": 1
},
{
"name": "plugins/modules/device_administration_conditions_for_authorization_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c4ae54deae540aff65316b9d6d3b7363adf97443cadea2d4dd598feab2559dff",
+ "chksum_sha256": "ac0ac34579d1eb813b436f24e5ff6301aa4892012fce09aeb839e7c6303bda07",
"format": 1
},
{
"name": "plugins/modules/portal_theme.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b8ab6a18f061e1b6a9746c50079722bd0f28fa259dc0cffae5fc35a50900a7b1",
+ "chksum_sha256": "eac74a6eab83f7eea6b4dcb79218495d9be828c5055b952d320b95abefd9f903",
"format": 1
},
{
"name": "plugins/modules/portal_global_setting_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "530fb46e6adf6e5c0b67168331a4212e8d541f4627f8b8bdb324a2b12ab27fee",
+ "chksum_sha256": "e832880b77d196074d3db6dd2ecbd5d8a113258054b3fd0c6f1db4e8d80e6549",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b8f50106fdf496a0ca8030b52274c932ed87ebe06cff7337aa1736aeb7ec0f77",
+ "chksum_sha256": "fae0b02d5163f8ebbed8648af13143912a5ab3863f4dc432a8bd71b77609a4c0",
"format": 1
},
{
"name": "plugins/modules/backup_restore.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fe58ad025a1fcfe393cebb7f0cbfe2b6e1db414d757f25c7507a5739c34b1b4c",
+ "chksum_sha256": "9adc139c28a598cd729c8cfe383aad08619712a6b33caf6f21802bf62bdea82b",
"format": 1
},
{
"name": "plugins/modules/node_group_node_delete.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dce8e3223c9da1a63493ff36349885467cb4813119f2cc9f6d190709b8fc1c2",
+ "chksum_sha256": "d7d21f4ad4493d9a1e84787d34632bf37c55084f6f79f5f084fb97899e255dc2",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group_deploy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3fe9329d3437e6a596e37dd02535a4fb8a6010f355cf4204cfc98dacefd5bf10",
+ "chksum_sha256": "fa70dd51e24afa87b6842eb88077010e0a01196ebf2855813866568d6179538c",
"format": 1
},
{
"name": "plugins/modules/allowed_protocols.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0f9d1fa3d08778160e6a843af3ae861c14bd9df23b6980467ef5c88e3ed932b4",
+ "chksum_sha256": "5fd8030b06461a911f78269b93e6ab1eb16e486701e9f3d0b4e163965ef40a14",
"format": 1
},
{
"name": "plugins/modules/active_directory_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fe4ea3aeea5b2d49eaff597347dfa1c75cd404bd288dd71efb326ad1cb49ad56",
+ "chksum_sha256": "42b2ceb4e49afe80bc417544029f550291558f42198b49addcac44946c7a617b",
"format": 1
},
{
"name": "plugins/modules/sg_mapping.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b9fb1c9231ea8e3f8678a606d9dd20355f7116459379937a1c42d51291d45b29",
+ "chksum_sha256": "e6a62e48d67d99e02e6846a1319c945328d01bf66c3f6885b7812865e46b0410",
"format": 1
},
{
"name": "plugins/modules/sxp_local_bindings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b2174c22447e4e7ba36f060627fd856249d48c43bd63439198e507fb7b7013a5",
+ "chksum_sha256": "135b08abf5d4b53db32136e5d6990b28fe93c49c733e7c304102b387f2135f8e",
"format": 1
},
{
"name": "plugins/modules/support_bundle_download.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6ec14a0d17d20cdc50f1dfc7a4c583682e044eee210836876cec9b427098ab09",
+ "chksum_sha256": "31a5652b2de6d2c210928246dcce7c889ccc53b66514527fc5572e062724bbd7",
"format": 1
},
{
"name": "plugins/modules/self_registered_portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "55f29c5d52b1d1b93c256c45814935de5c3587124ec35f3da691209d0a4c8017",
+ "chksum_sha256": "1f89c65ddda5385838c739f0bf1225ded48be6c2011b4ea0d718689ca0378f7f",
"format": 1
},
{
"name": "plugins/modules/node_secondary_to_primary.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7a428abf8c2bb0c8b5c137446a98fc5c93b52fa026fd950154fa7ee42d82bc17",
+ "chksum_sha256": "65ae947ee89f1b01906e504a9f6d50db8d646148d31b810da2dcac54badf90d3",
"format": 1
},
{
"name": "plugins/modules/guest_type_sms.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "87202258bf2865484722c6208fe771819a5165fca42569fdf83942e6dc325c65",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_nbar_app.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "39c8705d35b5a8f472bd98d46377c323e4f8c50d4474693b433bedd089c7c41f",
+ "chksum_sha256": "2b1ce1e32ec0486a3aaed2e0110b432b58dd1409ceae1ec4686a00eff771114c",
"format": 1
},
{
"name": "plugins/modules/sgt_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d78fa36f0113492703b2b2b6bf07d29c71061f88d34b858d63e5dd34339953df",
+ "chksum_sha256": "39625699166c8a5ef6a7847951a338289995107068a507ff3fadfc3392f71395",
"format": 1
},
{
"name": "plugins/modules/mnt_session_by_ip_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7f799c4c4cef8ddcf807d3e5922960f430eda25e28345c7ec074ee4656c94723",
+ "chksum_sha256": "26cea499bea2703550f16836edc00bda73e43568883915ee84ea241cedfa0fbd",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_deploy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2134c35001d99c368acbfce04094dab65ba6faa366699f8bd74de3dad86b0ed0",
+ "chksum_sha256": "cfdc27f93b4de8e932c0a9fd64bcbb3f44fc5f7e68f91e8851718680af258860",
"format": 1
},
{
"name": "plugins/modules/csr_export_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "81ce0b8bc7ffaf2b1c619f9f92153e56d42f99aa692b4e23cfb1d0e01f974063",
+ "chksum_sha256": "4c222e5e60eb643e121607ba219e39ed65ab2df91e2a93f252074a9bc736b7b4",
"format": 1
},
{
"name": "plugins/modules/trusted_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7333ee5ccff7132ff1eacb441338bfec8929c8ac62ef811edfcc037bb1f7dfc1",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "dac41c1c37fa7151c62fea48cd42b39aedaf5e96582df71ed780f7c1a533e249",
+ "chksum_sha256": "8122f76bf6346b714aa5503e3beaab91fb06a771ae82315fdbadf2f664883b38",
"format": 1
},
{
"name": "plugins/modules/filter_policy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "932c11efe2d1d891004c94de8f360387a63b22e2e4c85b01243ace004c466f6a",
+ "chksum_sha256": "776fcd99f707be4bdeaf66bb0621bb9cb7295d249c135e0fc4c85e59f9361713",
"format": 1
},
{
"name": "plugins/modules/network_access_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "362fad8d86a20511220441a6607db6d33417cfa2285a397d6f7721b21dcc5a24",
+ "chksum_sha256": "6963091d925e8f14277c0e017da5ba2923cac9a95588b9fd3bfa2f08884b42c8",
"format": 1
},
{
"name": "plugins/modules/pxgrid_endpoint_by_mac_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dc4bd937742bc1342c329f5b3ec174e54748ffdff0c147f43aa66e4d7206947f",
+ "chksum_sha256": "b43ba620feaecfc0443cd1c20a2955684aa22c777871c8bbb21529a1156fc5f4",
"format": 1
},
{
"name": "plugins/modules/radius_server_sequence.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0b18e493d0f06c5f0b9e7a9580727470b03ba72f9207eabbb2d48c6db2adb9df",
+ "chksum_sha256": "4009b312701993ebb7547211501f4ce87fdbd347b022b439970b896e734ea10a",
"format": 1
},
{
"name": "plugins/modules/device_administration_time_date_conditions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "53f7f1d8d605ec3f404745491255cc003d6fd69aebf7c65753196b1aefe4cbb5",
+ "chksum_sha256": "29850221d9e680f6ae463b47b2950c27d4c53151fef92029f6690065214ec6f0",
"format": 1
},
{
"name": "plugins/modules/node_services_profiler_probe_config_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6e1f4158e69573c7d05fbe3dea7e530cdc4d08a90b95cad34a21aebecd1545d5",
+ "chksum_sha256": "82d7d053ad481186e46a981eb1a1d48001c3a0f014633fe4c40dd9eaf0d5675e",
"format": 1
},
{
"name": "plugins/modules/pxgrid_sessions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9338f49012ddebef5f5d8ce0db92cc9e83f6074863483be819a68d5d454702e9",
+ "chksum_sha256": "d91b3a54f7cddeda8733304fc81554dcc007461196df950926d7bc3d26373e4b",
"format": 1
},
{
"name": "plugins/modules/allowed_protocols_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "927da67a40b901115bc90a399cbf26be5c9a19073e540d42b7487f6d13a49f16",
+ "chksum_sha256": "e7abcb03fc3ff329d890f4d08a400362d5265a0197edb2531e650e810d6c7e0a",
"format": 1
},
{
"name": "plugins/modules/sg_acl.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7e003a9ad3421c505a29a426d1873729c26e8a5640206bd4e238a00e120c0cf7",
+ "chksum_sha256": "b50d52db5a2d56665b884b52c233d1d9935df74258c8f4b74b019a8f4929ff4b",
"format": 1
},
{
"name": "plugins/modules/network_access_time_date_conditions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4d23ea2464dd5e64ad620c82ecffa4c5591c1f254b8102b04de62038aed50acc",
+ "chksum_sha256": "4e5e7b263490fd8129188741d92f478ef7a365133517bd43db464c448a4a68dc",
"format": 1
},
{
"name": "plugins/modules/mnt_session_posture_count_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d5b45afe7a1e32ed8da68e2b03efc186fc5270e454e9b32aaeffa2be4afe23cd",
+ "chksum_sha256": "e7ab7510580547456ab47e229b696b50e78fabc01df31ce3dc0a71c32b40e1fa",
"format": 1
},
{
"name": "plugins/modules/sg_to_vn_to_vlan_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5d784681b0f71b7da8d6e2e892d310ebde6a12826b899c07070a0b95b34df05a",
+ "chksum_sha256": "16634c15df9a30b3297ab08b36c92ce03ae44fd11fc34ab2e77913adbd142fb0",
"format": 1
},
{
"name": "plugins/modules/profiler_profile_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "acbd57df979e0b3907094707bcc38b7ea6d4b6262a7d8064441d95aab53ee9d8",
+ "chksum_sha256": "928d672be6b828d2a83c3c49dbaa21542255c1a59d7186ce3640996fc2e11a77",
"format": 1
},
{
"name": "plugins/modules/node_services_sxp_interfaces_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "18e95fdb713d452cf0125c872e2644a528f33228dee0347d8ed434479154d55a",
+ "chksum_sha256": "08f1727ebf79110d851dbe1f4e3e676bcaf579a8a7d4d0a157039a7949e26f81",
"format": 1
},
{
"name": "plugins/modules/active_directory.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "eff7a97302c84388a526171caf65a18bd285146de518f1f6f58647800af298b6",
+ "chksum_sha256": "60f8354f4f55feea9a38372f83d86c4ec2ac29f63a67a2c402b68f7929addb88",
"format": 1
},
{
"name": "plugins/modules/identity_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c944a5af18b0b4561018132aacab9daeec4a3e068ff3beb88120e55885c598c4",
+ "chksum_sha256": "0ed4883cb6c36f789f4c5751c23ccb42bfa59d5a958c0934f136384f246b4b58",
"format": 1
},
{
"name": "plugins/modules/mnt_session_auth_list_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b30d9f7c076b3a6da68a9d1dd39e034d65381f598d6348a894a4e552d7b8ba94",
+ "chksum_sha256": "067df7408dadca42dc20f52efac9948264c57c77faf27b726b57847efdb7adb1",
"format": 1
},
{
- "name": "plugins/modules/patch_install.py",
+ "name": "plugins/modules/subscriber_bulk.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e9bd05d13789cd92c8a0c4cd322b4e278f842f1e629c27b2cdbefe5bdd5a5cd9",
+ "chksum_sha256": "70a3ef2f608019f7f0f8c8c34fec3e5249d6b46fea8adc8191ec47e10c86c595",
"format": 1
},
{
- "name": "plugins/modules/network_device_group.py",
+ "name": "plugins/modules/patch_install.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c7edbe2012eddd8068caa07311aee812140185945f4c3a24c856309a6e9f4e5d",
+ "chksum_sha256": "f99520bf466f21469bbd60d167fa894a875b31aa5ad52e5139a45db3a1ce828c",
"format": 1
},
{
- "name": "plugins/modules/trustsec_vn_bulk_delete.py",
+ "name": "plugins/modules/network_device_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "47db6a3c9240c8e2b0f1a0873de6fcbbddc349ae0f174b8d21e3304b1b80a664",
+ "chksum_sha256": "934c9fefdd7d0e684791455f315f78d2bc5e82cde15a3c72ca5c8fb60c8ec082",
"format": 1
},
{
"name": "plugins/modules/network_access_authentication_rules_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "44f2bae93dd003607254644deccb669e9259438114cb2638fcc37c4720532601",
+ "chksum_sha256": "056e3ab2968b328dbb33ba1f39a6e1f26c824351774e6140581e5bdd8ab3b6f2",
"format": 1
},
{
"name": "plugins/modules/device_administration_authorization_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f4b24e9987051a94772e0a3eff9ae262dfefeab5552279cd66ca327faaf4dab5",
+ "chksum_sha256": "e5b3ed079b2b2648aa3ed9667df214f21a123b0cea278706b1d2b55903653dc1",
"format": 1
},
{
"name": "plugins/modules/tacacs_command_sets_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5b7530910181dc8bda5041f038e1900603904b1266531d6b455a55674160ff1e",
- "format": 1
- },
- {
- "name": "plugins/modules/trustsec_vn_bulk_update.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a9849daf062f7066061fce7e4a5a56294b2bfc84e6bb3e0d576fa259873f2322",
+ "chksum_sha256": "6078960ad6d221b7d90b7d1c3f7b42194e4b150d4190288242ea2af6445573f5",
"format": 1
},
{
"name": "plugins/modules/support_bundle_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d66289c9ed4e439291fcb70957d45d1f389f15747551edc7e6361151f36545b6",
+ "chksum_sha256": "d1676d8c7b2e873fe2e9a1cc71177d8ad46334e5030b245f9a961f3fe235f3b1",
"format": 1
},
{
"name": "plugins/modules/active_directory_leave_domain.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dbc82ca2e03b9f3eeeafe6ad0cc945b44252e2d6edbfdc1e70329419bae5c8d5",
+ "chksum_sha256": "9c172684a67855d31bb015f9791e44a37aa7c6958200c5ca92dd30ca12b49975",
"format": 1
},
{
"name": "plugins/modules/endpoint_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4b7b3b1508fec68a5354cecb1312a3d089febdbab113ce4a53acc7fe15a6e38a",
+ "chksum_sha256": "52663b0e052d8e99c6d88563115c3557a1f549a377b1703107a0bc878378fa8d",
"format": 1
},
{
"name": "plugins/modules/guest_user_change_sponsor_password.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8d43cd8f51592a27581172ec3d5cf3096cbe52077afeade3f47e081acb49fa9a",
+ "chksum_sha256": "8ce2b5a24d0096e497b6130fbb03f0c9ec813a53605d6c921474aa9e9b67ca12",
"format": 1
},
{
"name": "plugins/modules/network_access_authentication_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a8b226b3541020ed02bb2c0bc759f622a930006d7d68e7a7350ad33ace60e63d",
+ "chksum_sha256": "aed94f53f09a5f7d861d4482bece10dd484c4362a6a0f02829315f0fd1c72818",
"format": 1
},
{
"name": "plugins/modules/downloadable_acl_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d3bde433a205f2f3bd41e47233d881469523ab879bcaf934cb49f46716d4fc20",
+ "chksum_sha256": "140ba57c9d7b7f4f0a5b0ea1a51fa0008bc921d6513b0ab39a7622daa43771df",
"format": 1
},
{
"name": "plugins/modules/device_administration_conditions_for_authentication_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "501468609ccc0afcc04701a396eeba86f3eddc89a94a22416b816f2d6db7f2f3",
+ "chksum_sha256": "d480b64169c3027e837a91cb230f565246041fb282d7229f13d364f04118f01c",
"format": 1
},
{
"name": "plugins/modules/pxgrid_account_activate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "411f4c910ee124f83a642dfc23226005d91625882364166db5055b49cd12ec58",
+ "chksum_sha256": "c739ef48014d48c8f8c13d6c6508a4c4468083ba1c36d14548175c67ddac24f7",
"format": 1
},
{
"name": "plugins/modules/sg_to_vn_to_vlan.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f3b020a13b5c1696d3e9a856cfd7e35bd21018c789f20e4b908b46adb34dda64",
+ "chksum_sha256": "b0be26d7e8114496c0975235ca07110a05e4b1ec928a646f8949b5790f2bd3bf",
"format": 1
},
{
"name": "plugins/modules/network_device_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a48033fffccafb3f7e9fb26459aa1fe2ad76cd0a27609078f46d86fca5da8a9a",
+ "chksum_sha256": "de59f2824111470884b277f2adee0b3192623514426558fed5a640ad533bed4f",
"format": 1
},
{
"name": "plugins/modules/device_administration_authentication_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3084578eac40b19f0ced3e70fccbe9a24a78598f4a8997391e34048325c82df7",
+ "chksum_sha256": "aad476fd584a0cbbb9e5da60c648e07d19384e111863f323d14ba3915750b844",
"format": 1
},
{
"name": "plugins/modules/csr_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7cecb84e4f6da3cec42076435407259d3707a2e2b293abf2cd3ff6ed52e66d12",
+ "chksum_sha256": "c8cd0a19db8c2ff90701470eaec2c40eac41fd7e6a1890802aa743e4adaf8317",
"format": 1
},
{
"name": "plugins/modules/authorization_profile.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "27c828e09bbc869e5ae2ecf7127a9577b18ff2eb703255038f3d59bcc438850a",
+ "chksum_sha256": "7f7c133399f06a9a77d4d855195333a9ad9f482c91b1ed12f7715c477316b35f",
"format": 1
},
{
"name": "plugins/modules/sgt.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c8908c34312edaef6904236e773ce36be9f8272b9a30cb6e7d6fb8ff569bc123",
+ "chksum_sha256": "11990c1d407ad61e77dafa8ddcc1a173c8039a2abb41f30189f0dde0c54ba6ec",
"format": 1
},
{
"name": "plugins/modules/patch_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b8655f5ebc046fcdeda8cb2376a9206bef270fd1504e960e0121f516c1dcbb19",
+ "chksum_sha256": "a0b11e871bfa667c3c162c3e685d0abef3c0ec7bf844bfe2274278dee8123698",
"format": 1
},
{
"name": "plugins/modules/device_administration_service_names_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "221d7969d00121e74624b83f6f5fad460553ffc0dbf5de0da99f40a1d8a2410c",
+ "chksum_sha256": "fd08d6d64c3a1e845cf0c4f12f6965d9c20addec0fc30c3240877e9ddcb98fbf",
"format": 1
},
{
"name": "plugins/modules/mnt_session_delete_all.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c75e9e6c9d210a747779efb2d7fa118980959f84a94a1de257c3f47c9075376e",
+ "chksum_sha256": "5efd226d77f42f8b8aba5dd2384ff129961c2b9ed6ecded473725d29245779a9",
"format": 1
},
{
"name": "plugins/modules/px_grid_settings_auto_approve.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0209d9dd92eef1007ace5cba1e463cba630a3617c22b7b469dec0d91fd02dfd1",
+ "chksum_sha256": "0143c9da5cc4178d9960b3fc8ac7e683e53573eb8e08a506b464fac48aa77c21",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/connector_config.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "9e44ac4997b4bdcb9567bdeba890e619a3e794801a89eca2bb4ac71b81ab9206",
"format": 1
},
{
"name": "plugins/modules/endpoint_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "448e3e2f994e3e7eeecf28f6abeba24642b868185c24aae878808b65bb9df0fb",
+ "chksum_sha256": "ac2ee91691d27021b47ea49c39b34865b50917d0a30750d651db0341139d3928",
"format": 1
},
{
"name": "plugins/modules/network_access_authorization_rules.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a197a0f6a544d5725b21261b104b8cc448c995364fba1c7ab3bedd0b3e4bfda9",
+ "chksum_sha256": "81f196ad4a4027c1a2d9514d92b5459ac2afe68292e5fa28747ab0aab23a932a",
"format": 1
},
{
"name": "plugins/modules/mnt_athentication_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ea64724f0d88cee1ff56e59b723d5cd6c0b8c813e3d676988875bb8c55c733d1",
+ "chksum_sha256": "135f75ff102f2cfc50870846320bec461beb3bfda1f0a68acf2b856cbea4ce91",
+ "format": 1
+ },
+ {
+ "name": "plugins/modules/dataconnect_settings_status.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "9e785130c64b7bfda6ec5d0d5916ff1894dfec94406f07c1ec99e82118bdfc04",
"format": 1
},
{
"name": "plugins/modules/device_administration_conditions.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5337a1f058249918fc2759af23816d0fb545382d7e94ceab561841f1239265fe",
+ "chksum_sha256": "affd4a8462b694bc6073efa52ec4aee7153864b5f9d9a4c2d43c978d5e11d639",
"format": 1
},
{
"name": "plugins/modules/sxp_vpns.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0177b49c9dc5ceade8e35449542063bc7c95fb4a035ddd0fd0791c804dc95416",
+ "chksum_sha256": "886f4337df0e82da7c94965276eed8638535fa4a3585b97c21afb8f386110963",
"format": 1
},
{
"name": "plugins/modules/device_administration_local_exception_rules_reset_hitcount.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4d40cd090d546b370a2b8e26ac654a65c2c1aa1d705ad936f0016e9d6d5b60cd",
+ "chksum_sha256": "8b5a1a060008f3d62d51a6461b940471fccf67fd1214f665684d8c131a277ad2",
"format": 1
},
{
"name": "plugins/modules/resource_version_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "31ec92a69419ad7c7bffa0adf6744cc5e0fda39acb78e5c8f7fd27419022fada",
+ "chksum_sha256": "8cfbf5996672a5cceee6c0cbd8b3855808ddc8982304bc05b87157d0ae8972a4",
"format": 1
},
{
"name": "plugins/modules/renew_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cecd408ba7136fbcee5687ff73ce014c004ab5ffd5031b7ed3bf5159816a5ceb",
+ "chksum_sha256": "9138ed3377ab770a024a0565d6d56806e31438a3e00bc4ec8c1d61c598424c54",
"format": 1
},
{
"name": "plugins/modules/endpoint_release_rejected_endpoint.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "88892b97fe09e218ffd880844de89060bcd2dd9803ddec805aa90bd548f8a9b1",
+ "chksum_sha256": "76446a579f2f0c2a848d537db6a18d30d9a2e423604a60955118e0607dd5d002",
"format": 1
},
{
"name": "plugins/modules/guest_user_reinstate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "50f30ea916efa32df61afa0b43befe129744298dfbef0a5eba5567c449fd140e",
+ "chksum_sha256": "4c59aa7e1d3108236a62c497bb5ccb392f92ac2b39ea313a86ad738aedbebccf",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell_clone.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "61508bfbb55c9afca0ae27d5bf978cf7dea4795fe4949a605808cfce27e8ed19",
+ "chksum_sha256": "5c76778fb1db86873357e41b7111e0ffc67d5145c1a647cb1ebe407be2d7fd13",
"format": 1
},
{
"name": "plugins/modules/my_device_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5c56674fb9d310e54dc4a99d35492b34a88279a9331547c9a94f7c8dd3f8fc65",
+ "chksum_sha256": "dc58e7e8538e3bbc28dbabdf8f8a1de1d5ddc63ad6353668fd6bbbde18ad811e",
"format": 1
},
{
"name": "plugins/modules/network_access_conditions_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d5eea49dedb6f001563775ef48f0a505382293f93bfb61902b631062b24a084d",
+ "chksum_sha256": "0dc6bf0621f8e0edbde010726f7adb641d9e9f544d7c2a7a71b58a2196a8b12b",
"format": 1
},
{
"name": "plugins/modules/pan_ha_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bb1831837261f2bbcad0ac2ba1fd33f9ea63c999634ae0048961a92def30de5d",
+ "chksum_sha256": "2a5e12e67ea4100d862876a1a20c1d7a8bc4834a34c98f14d28ebd41fc233dc9",
"format": 1
},
{
"name": "plugins/modules/pxgrid_user_group_by_username_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7f525e41b5f546c676c64c1ad876d61ac65cbd5619f9594d76b1c52bd4aa03ed",
+ "chksum_sha256": "b7173618a4c649ba56ca8878371c596350964dc5cf80da2e564ba0846e974c70",
"format": 1
},
{
"name": "plugins/modules/node_deployment.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4fa60c1838da98004c1965853fe8dd168a8ce07c5d91fb9df8987be28204c735",
+ "chksum_sha256": "e5c430ca6107d1a0c4e473bc2ec7ee2afd9fcd0d3fd1e532496fe10e2ea967aa",
"format": 1
},
{
"name": "plugins/modules/certificate_template_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a870b5f613f3f3c807ad7089264a60ba77a23771209940b5998b5b288653583c",
+ "chksum_sha256": "53aac7e9e6cac4e68448da17e9e1492842685deb6ff3f864af87d583093b7912",
"format": 1
},
{
"name": "plugins/modules/tacacs_profile_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0d7001cc7b3fb9fff0aaeb207ad3783505a7685c1d8824146cae67c4563efc33",
+ "chksum_sha256": "3e504ef810dd3090fbcd437cebbfc7f0e00e77b165400d8a8e4bb7323221d12b",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fb7429ce1099f1780f882205ea46b2f08a76259121f215b2774cb71c8e2589a4",
+ "chksum_sha256": "2086f5e45421eef6a31fef68f51d695f766730072a9b0cb9ee72b6b8ba5bc921",
"format": 1
},
{
"name": "plugins/modules/sxp_connections_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "be96d909d67c7955ef86e9d86c3dc4f7ce3e33a10262395c12b8fcbb10f3835f",
+ "chksum_sha256": "d4c68238dec1af718271b3d5306ea000197c632d4821032c9a7c8e55b3770d46",
"format": 1
},
{
"name": "plugins/modules/pxgrid_service_unregister.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "039d61a71d5426f6703df8ae82dce4f771351363e0d57eb7572a485b46f37dd2",
+ "chksum_sha256": "ac3fb44bf0da59bab2563ecf232edfeb9f1ddab9776733d1790859c292d4d09c",
"format": 1
},
{
"name": "plugins/modules/byod_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "18c52e0ecbd43fdaf5fa6ddac70256471f51f538751486300f681cf8837f8d6a",
+ "chksum_sha256": "850da29937bdddd65d1537819a6bb1b4a24dbbe9a22a656a6ffcf7dcb16b6c1c",
"format": 1
},
{
"name": "plugins/modules/sg_to_vn_to_vlan_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e6ad766d005a34a955c949f17bc6cd2e93cf1323b261cfc87ca95ef88713fb9b",
+ "chksum_sha256": "5149b51f0543e13cd156db9f7a5e348d9e2fb93fb8f667cb7b0dbc51b5e40681",
"format": 1
},
{
"name": "plugins/modules/active_directory_trusted_domains_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3835c14e30792495f69bd69500f303eed96abc091ef67d7e68d0481c14790fe",
+ "chksum_sha256": "44e49c7bc5161cba9d58a3369c1280603e9f930f4ce43d89b3b2134c2300f780",
"format": 1
},
{
"name": "plugins/modules/pxgrid_authorization.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "88dda74e16ab3354c7a8b68134bb03fad8b1983efdaa8b71183d6deb9b662613",
+ "chksum_sha256": "716cbb731974d0a0ccf91ce064d71def0da5c4d69d0b676d7e44b5c014408eb6",
"format": 1
},
{
"name": "plugins/modules/licensing_smart_state_create.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "683cd1e8f079e4fd5471af14ef215dea8d260b80b42ee37d635a79feabb57b1b",
+ "chksum_sha256": "13c2bda14a972d7be86ef90bd61e0c8bd56f7374866f515859bbc003d2d5cdee",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d514139cfc7a0e7feb2ad58b71c74c286c92f6c32ced9c5630bfd6cceb9f1d09",
+ "chksum_sha256": "5a365c7a7d2f0b706a63d649acb7807b8c58c06b2f61538c96e27894ac861832",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_deploy_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8d8b95e136c0b1ce5dae49035771e6b850000644686862b5cd92d3430050d32f",
+ "chksum_sha256": "c082f7ba3c2356f15b80b7fd8b0ba8f25093b07815e8a33dea1703616a5127aa",
"format": 1
},
{
"name": "plugins/modules/sxp_vpns_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ab9beeb323d726775782016e83a87c8949136a5db63528cbbc9ab05d0133e8db",
+ "chksum_sha256": "961ef697ad94b8234c501b39c29b4c4cfeedeb506dd26c2deaccfa843f4561d9",
"format": 1
},
{
"name": "plugins/modules/device_administration_command_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "370d9955690f80e2dbb22388bc1fe82cf57d303bccee8e46d7b569342f275f02",
+ "chksum_sha256": "abfd39aea65d01234aeb547e3b1116eb9e3cc2937fc6352699ec6368836f0c32",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_group_deploy_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c3b8c8c6044c74f8780f0a54758ed69e4cc55525e98e8df4a75f7b771908b15c",
+ "chksum_sha256": "20f33dc8990466d7672f50a8b0f7a20f2e20f144828bfc525c3db0454b5fd855",
"format": 1
},
{
"name": "plugins/modules/repository.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8b716e775664335f54bed58577e051d89be8cd80a40e6ccfb9de529e1361ccf5",
+ "chksum_sha256": "0ffa9ec0cacc42ccf95c6220b57e34e6d63a3c9e563e3199b92b7a4ddbd58e7a",
"format": 1
},
{
"name": "plugins/modules/guest_user_suspend.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "19bfc4f3c8ac892c63e83415d6eb02e4dab8dd1da1c3d1e9785c451234367c68",
+ "chksum_sha256": "b79b5d16c3b66c3554577c2af772736f964e81bae3a5c4cce2233fb856f4396b",
"format": 1
},
{
"name": "plugins/modules/network_access_local_exception_rules_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e921ee75377931f9bc379453f90924507c0d63a41675c70551f0069816cb6ff1",
+ "chksum_sha256": "51f3ca86580facf658cf1abec964895a4043a4e1f5d207a54f9623cdde7f3431",
"format": 1
},
{
"name": "plugins/modules/endpoint_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "52c17aeccc655691ddedfea82fb23ab0677ce2410668cf9e8420064e1684ac80",
+ "chksum_sha256": "7fab9f7da635106f2a36d21ba7d1f6ac79693166f3453b50a4b9f4bb29b0bb38",
"format": 1
},
{
"name": "plugins/modules/device_administration_dictionary_attributes_authorization_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9d175eb83c50464bb8e80037175e68f5da105fdc802eaca4e8ca38582c82a396",
+ "chksum_sha256": "07cf2f446be9ca3f8ddec70f6fb4f1ea5996c3c021fbb12f342aa2e9a400fbdc",
"format": 1
},
{
"name": "plugins/modules/transport_gateway_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "29ea7e916d3bad76f0224a7e2ef3235e885bac76514ca67e441a9bf325c0bca9",
+ "chksum_sha256": "24ad7f493db1ce466405b348ee57cb7b97ad40f12810340c89f8612ac61e5d8e",
"format": 1
},
{
"name": "plugins/modules/backup_cancel.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "20bc1c12edc8c3489b1f6c8d52c967625b003cfa0eb092c5ae546db8d2d7f045",
+ "chksum_sha256": "8b42e4d9b7f8dd07571306c1fae0cf89491307672d07b482f8d4b0355843d03b",
"format": 1
},
{
"name": "plugins/modules/system_certificate_export_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e31a2404e4034b042fda707fcf6e7c1144ada90f40dc5d49e39aca09ff712b2",
+ "chksum_sha256": "1c01f01b4a086d90244e0ba5ce9348133e88c31f430b01d5b54de5cc5b4b13d2",
"format": 1
},
{
"name": "plugins/modules/guest_smtp_notification_settings.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dee302980885a67555190e0a2df39f31426d4717ef324438c9fbefd186f7ea7",
+ "chksum_sha256": "0305e409cb1ebd535dc7eedeaf444ba65352b9a5cbb17668a2bb136495bac526",
"format": 1
},
{
"name": "plugins/modules/network_access_profiles_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2f7f18adeb942c2957d3d60d0bb26e2561051ce618adcaeca00b9b27c02b1dae",
+ "chksum_sha256": "a3c11c1dc47edb236e5f5052c50d822cb84a2acaa2518089493c50b51deb8151",
"format": 1
},
{
"name": "plugins/modules/active_directory_add_groups.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "89f59acebc586c44d3cbebbc5421cf6b9b69ac680b6bd5b2de340485a7da3817",
+ "chksum_sha256": "4e09e04050499f616733bdb2101d8addb5ac566a31c4b295763180e4430b5bb2",
"format": 1
},
{
"name": "plugins/modules/mnt_session_active_list_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4ec32000f0e6d42e8eef5b839b83182e17f9309c9a2e6c78561222232ef0e27d",
+ "chksum_sha256": "1eb5965437fdc4341e192c2ead750e303c95978af102fa36e592a7f19a73416d",
"format": 1
},
{
"name": "plugins/modules/anc_endpoint_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0272e411560e5411f644981e6cfd89126128d46c93ba0b41f627240d6a49fe6a",
+ "chksum_sha256": "7a3569d21abf2efc954fc28bae550fa3785f1422afa361eef6cb3a9ae29b1e37",
"format": 1
},
{
"name": "plugins/modules/guest_type.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a2b702d81bfdbef4ec6b945596cb5b5bff75e121e08d12e9463266be7c55396",
+ "chksum_sha256": "76559dbf5d0dd9789aafc54c94da8a6de33c526b58d7eff513a66ef39719a703",
"format": 1
},
{
"name": "plugins/modules/active_directory_groups_by_domain_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "93ddeef12d6d2669d00c13b7762e73c96ea61ccaa44d67afff751a46c6299908",
+ "chksum_sha256": "0eac95f6f75c1fde3207ac1ee8514e5c2052951cc6d912c5234775e844540a49",
"format": 1
},
{
"name": "plugins/modules/network_device.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ec3f770d649227d7bd4c0952c73e22b637ee07ba93420505df3943b3fb4f1cdc",
+ "chksum_sha256": "f991f5c35be49f5d6fcbc0bd697d4e026fc446a75ca8623be0b709318156ec69",
"format": 1
},
{
"name": "plugins/modules/network_access_conditions_for_policy_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d29e3b7dcc7a1d877a7aba05f71c9e92bc0719d6c33be146325c10f0d8728432",
+ "chksum_sha256": "0d5430c7a05800cb2d57d78ca3481ca0fef6734cebc64080ae973fe04cbbd75e",
"format": 1
},
{
"name": "plugins/modules/tacacs_external_servers_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c94bb5f2e9e31c7f58749e8cabcf3fd6146d16c95c39e53652142ee058c11307",
+ "chksum_sha256": "cb879f487ea6f18b672115e75eec0ae4fe4026ddc86f13421bcdea7c1ad3fadb",
"format": 1
},
{
"name": "plugins/modules/active_directory_join_domain_with_all_nodes.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1e964a0773a88079a397484f50edec834aeec9da05020565e58b4beeff28249a",
+ "chksum_sha256": "14b06a4ef10b9b2584e8f532fe1c37677b72fad9c239990b2d50b29502f7e6e7",
"format": 1
},
{
"name": "plugins/modules/pxgrid_service_reregister.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d967ed3ca37ea997a0d5547776dec446abf219e08de3ecf6251d5e052425d0ab",
+ "chksum_sha256": "ac9855f6d676e6f9300c1993cf53fe6728cfb0eebd08ee2f6bd12a8cb0d09eef",
"format": 1
},
{
"name": "plugins/modules/device_administration_policy_set.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8047ab01c7b34fd6d450f0539dfdd4c9e51d3bfc9bb1bb3990c44e18a3341f93",
+ "chksum_sha256": "b1e339b78bc4a644f0b989808b9e32c74d5dcfec162b97dbb0063f0e0058a111",
"format": 1
},
{
"name": "plugins/modules/hotpatch_rollback.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "01011f6358c0040ddf3410378cc39750bb9fc57b53ed38bff552c8dc2fb943b0",
+ "chksum_sha256": "5bbebb8f1ed74a0d02feab93c65ef1e318512ca91a3439d68a6ff4a95ee7301b",
"format": 1
},
{
"name": "plugins/modules/pxgrid_service_lookup.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b1c163f4ff7ea6c88d071a18a9be2685209ea72a16a8910150285a4971f9ed60",
+ "chksum_sha256": "eb23143fd6f111fce408ac8d4e75dac145de82006d52dd37a96ed1ffa05e6e96",
"format": 1
},
{
"name": "plugins/modules/portal_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "75d247a8da396dc7ba4538b7e17929d019facdc14402a36257b6ffefdb63243e",
+ "chksum_sha256": "86ab7bb424a1c6a4f41c41bd6d7ad204ff661388f684b774af1b49076ee4f846",
"format": 1
},
{
"name": "plugins/modules/anc_policy_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ca619737532329676162af6d79e2c65e3f87f25fc3c6bd2aa962d59ffececbb2",
+ "chksum_sha256": "e2db248923a20de099bd0a08ca6005fee8ff8c6d9d86834eebaa3fa3f58b4b6e",
"format": 1
},
{
"name": "plugins/modules/network_access_local_exception_rules_reset_hitcounts.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5d84b499c5401da5cfe0e3f1e3e5c89e674e3335d6f514496cd145b0d97a9b6f",
+ "chksum_sha256": "d77f9887d2c25f06a3b45201865727e8a145ff2d9aafa2be1f1f760acb5382ba",
"format": 1
},
{
"name": "plugins/modules/device_administration_profiles_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d9f5bc044f10473afeb114d9bd1157014211cb649710c7e372e413ee6585cf79",
+ "chksum_sha256": "76c1ca1262737ffd4d0ed1c5e3602402de168d0b3e79e06f9981683771a8ecc7",
"format": 1
},
{
"name": "plugins/modules/hotspot_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd6ece9741e6c0e854ed33c59c93a69e74e187238e00075b1a81ee3f8ba88f0c",
+ "chksum_sha256": "348aff0535f872fac8d9513354f67ee2ca67f84ff42b7052ba1b11abe2e1d536",
"format": 1
},
{
"name": "plugins/modules/backup_config.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cb15b17f8a16f40fdddb60e50b87b0eb26417c85f55ff37d016d4757e1e79680",
+ "chksum_sha256": "7b9ba95bfe05869c4f2ebb1576313c3e277c669686059b9f246fb72c27043a14",
"format": 1
},
{
"name": "plugins/modules/sponsor_group_member_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d48df234eb72a4d2d97e86db2302580190637f6c5d4bdb962d8faea35a88e094",
+ "chksum_sha256": "aefdc19a57de8b900e577a79b07583c669c19ec64c4c974f80cd1078e6d4d0e0",
"format": 1
},
{
"name": "plugins/modules/native_supplicant_profile.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "448af9195e3c4adb4e01f17242e0fa57594f5d111b3610881d64f740e9f3ecf1",
+ "chksum_sha256": "ebe468677f8aecc2f3f0b8cd6eda96438228698d3504d992da990bf50d466531",
"format": 1
},
{
"name": "plugins/modules/network_device_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "aa086c6958f8232ae0be9716b57783a76a052c2e5f519daa933f122f8747bea5",
+ "chksum_sha256": "2c5f83d40eebe3d0b1db590f20726ade3589910fd444f1de8d6e56afd2466f04",
"format": 1
},
{
"name": "plugins/modules/egress_matrix_cell.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "428b022d98735da70ce7cefe9c9ea4915094afef7514c6e3300273a5c9c5a3e0",
+ "chksum_sha256": "168dfa04224c2f353fb93ab9d238d43d5ac8f38dede8a70a8fbdac5cda5c6a63",
"format": 1
},
{
"name": "plugins/modules/self_registered_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "23f518cbe499fadbaedc4ec076b6f4e3010fdfc65c9ecbefc49d21f27700782d",
+ "chksum_sha256": "c7002e1b65e71ac66cff428c5bc948675cf580925400216659331f2156983c80",
"format": 1
},
{
"name": "plugins/modules/pxgrid_endpoints_by_type_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8c2b1765cf40fab9631b04df4e32ad311300c06d18ba912ae1bb48e454d495c7",
+ "chksum_sha256": "6c19e5636d12ae13395165460aaad23d8462fa70158fecf4e9b8c91d8e9f4d17",
"format": 1
},
{
"name": "plugins/modules/selfsigned_certificate_generate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "97f5d187ea54aa2303e648af6e322161a8419e748121f17bfc01bbadf2295041",
+ "chksum_sha256": "546a291033d01ea28bb968967a462868266c089a876bf60fb2a445f0542ba2d5",
"format": 1
},
{
- "name": "plugins/modules/trustsec_vn_vlan_mapping_info.py",
+ "name": "plugins/modules/external_radius_server.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ff266c8661f5a0b1d3b2b57de9b7060b644f371a21b72ab2040d125f479a4f65",
+ "chksum_sha256": "746b442891b8a9acb1a5bc67b8d2f3ad1b5e27acc2c7fd9f5565b62300d2ac99",
"format": 1
},
{
- "name": "plugins/modules/external_radius_server.py",
+ "name": "plugins/modules/dataconnect_settings_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4cde6c1650f69d40f83683aed831809d654a33fd3214fa67e8a39a4b2e83782a",
+ "chksum_sha256": "890c65c102b37b0306294437f5b1a85973a3a330eb7fc22481799790ea046717",
"format": 1
},
{
"name": "plugins/modules/pxgrid_security_groups_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "081722cf7e1b11470d8f2be3e8e48c8319dfeaf5f87ea2da94ca37645eb77008",
+ "chksum_sha256": "0d1a4531df2dac597cd9b30a29263981f527ad353c2eb13294eb2f1999cada56",
"format": 1
},
{
"name": "plugins/modules/internal_user_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6a9d67b9d0356e43f9105d7a646a9eb0c826ce25c3397e99a25719ad72849600",
+ "chksum_sha256": "05a0e8ebb98b6f10b43c4b2b4e359743d3489742ff8aa2ee1c926e3edd105bf3",
"format": 1
},
{
"name": "plugins/modules/sponsor_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6751b7af97c401b83a7f0e7fd7f77c2edac3c2a72b2866f6f583fbb5f10db18b",
+ "chksum_sha256": "1d4c4ee1b8aeb96c42bb0a6ed06e8ed37e6a212fba4ff788f177918cea7a9c91",
"format": 1
},
{
"name": "plugins/modules/radius_server_sequence_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6409113af7d415908c11db9fd91699616ecb1768224b5c920ecca58c74fd624b",
+ "chksum_sha256": "619ad9d219c78d01a45f712cda378b8ff15945f1d04648c0880feda6e3cd1294",
"format": 1
},
{
"name": "plugins/modules/node_deployment_sync.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e1b08a526d333babe847944fc000695f6f5ab41f00c414869cbdc158cf2c38c",
+ "chksum_sha256": "64a68a165c75c49095fc1677f6319e5353a976870987d806eadb4b4872e0cf52",
"format": 1
},
{
"name": "plugins/modules/sponsored_guest_portal.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "093abb41f405ed5f77279d0d3f121a6bf27b3cf8fd4e8f97b2e354a86a0e2f79",
+ "chksum_sha256": "e4885db2669c90cd436784c60a5f69733c3b7208f605405444d00b7f9ff683a7",
"format": 1
},
{
"name": "plugins/modules/guest_type_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "24dc53431a2f72d97b31cee9f4faac943b035fad3739626e34fe60f3b8712d1d",
+ "chksum_sha256": "31174879c6d1341232fbcaf1e136a18396806b4d80be0e077edcdba639f086bb",
"format": 1
},
{
"name": "plugins/modules/sgt_bulk_request.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6b19f7bd1321d67b2a582d188160040a6ff511c2e7d57e027f1c674f8447c3df",
+ "chksum_sha256": "42bf28049da1e968e93c15b189af60fabca2d78bc20be0a931e8b051647a3f94",
"format": 1
},
{
"name": "plugins/modules/sg_mapping_bulk_monitor_status_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "342e577ca90146213574f8e2834a43184995eed4cca12131e94b36636086de5e",
+ "chksum_sha256": "45dab621404676dc54ca5934ad34b2fd7ba3f876f5f47911c580eccacdaba8df",
"format": 1
},
{
@@ -5503,17 +5482,24 @@
"format": 1
},
{
+ "name": "tests/sanity/ignore-2.15.txt",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "format": 1
+ },
+ {
"name": "tests/sanity/ignore-2.11.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "fd8f3ff55472e7b574eaf8756c59af81ec80a34d28924df54b2f34e406167bd7",
+ "chksum_sha256": "0957ef3a6de933fc4aa49da7fa60ed27e12eb10744ad51b0478b011b79e963df",
"format": 1
},
{
"name": "tests/sanity/ignore-2.10.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "87293a1c8b352044abc86210d8cb127919b19df18a469a10a1d1b0192f3ebcd1",
+ "chksum_sha256": "9a1231b15ebf55e6bd11c60aecf329f2583091ad6c2257976b5aeb27c5fe916e",
"format": 1
},
{
@@ -5527,7 +5513,7 @@
"name": "tests/sanity/ignore-2.9.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "87293a1c8b352044abc86210d8cb127919b19df18a469a10a1d1b0192f3ebcd1",
+ "chksum_sha256": "9a1231b15ebf55e6bd11c60aecf329f2583091ad6c2257976b5aeb27c5fe916e",
"format": 1
},
{
@@ -5541,7 +5527,7 @@
"name": "meta/runtime.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "48a2f61c72296aaa190a3ad670b0a5759bd047262b59b3d870e986b05878d87d",
+ "chksum_sha256": "2e182a22d58fcfbca71fbef1992147e1cd87fc67648750e62b5955ec72521520",
"format": 1
},
{
@@ -5793,14 +5779,7 @@
"name": "playbooks/network_access_network_condition.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "902668b9f32f319dd0b733ede237147a0f87bf8fe698ac76c21b4b09a3603c32",
- "format": 1
- },
- {
- "name": "playbooks/b.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "dfac4a43c6215b9992ede57c2c9ed3eff9a8a4caed82b91d82ada45904d0c641",
+ "chksum_sha256": "b1f9ef2210fea578e07c1c9cee10acdd4f77760dddd054b426c7adf1bdb80098",
"format": 1
},
{
@@ -5856,7 +5835,7 @@
"name": "playbooks/group_vars/ise_servers",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "aef6f55ee40f79465794ebf4c49a75b4fdabb1e4145e9d25e1c8a6fa2f837bcc",
+ "chksum_sha256": "9ac69d55205ddcdb3a2084acb395f4ea26e195b233b37a5fbb01767aff48ce85",
"format": 1
},
{
@@ -5909,13 +5888,6 @@
"format": 1
},
{
- "name": "playbooks/playbookstest.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "519c2bdd245267c841eb1690740f23b57db59cec5ccf4f36d56f8208eae7c381",
- "format": 1
- },
- {
"name": "playbooks/csr_export.yml",
"ftype": "file",
"chksum_type": "sha256",
@@ -5940,7 +5912,7 @@
"name": "playbooks/network_access_authorization_rules.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0b718f75b4b3ae3991562378a7de2a0a905fdc155bc6d18c621be4daf1796ebc",
+ "chksum_sha256": "d549cc23546d53bb89a2c60c62ee1d59e3d72af4eefd8826cd2237a1bc6307a9",
"format": 1
},
{
@@ -5993,13 +5965,6 @@
"format": 1
},
{
- "name": "playbooks/azure_deployment.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "95900aeaa31044ee6f5d0f26f108074f26e8aef4dc56f9b09ddac9cfbc75aca4",
- "format": 1
- },
- {
"name": "playbooks/allowed_protocols.yml",
"ftype": "file",
"chksum_type": "sha256",
@@ -6066,7 +6031,7 @@
"name": "playbooks/aws_deployment.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0c4ea3c151b05dc4f33a1ef2192a8414a3017b2b46b6474773afada482bde734",
+ "chksum_sha256": "cc97211ae36f89386a5372975d7e0d8b13291d71d462b2b7499689a19bfbdcb5",
"format": 1
},
{
@@ -6077,13 +6042,6 @@
"format": 1
},
{
- "name": "playbooks/credentials.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a41d01f20875f571a9e1a2502879da3acd618801085ba61d5c809f0facb0a6ba",
- "format": 1
- },
- {
"name": "playbooks/network_access_authentication_rules.yml",
"ftype": "file",
"chksum_type": "sha256",
@@ -6129,7 +6087,7 @@
"name": "playbooks/network_device.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f3cd35f0f78abe30eaa95d27638a301760cc394ff88807c56d1afe6d1b5556cb",
+ "chksum_sha256": "4326ac60f93964ce22281cadbe0b952c8c6142bd9c6d8f9021233a77acad0eae",
"format": 1
},
{
@@ -6157,7 +6115,7 @@
"name": "playbooks/hosts",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3831686ce8b3b790ed5e77211eeb02bac1a6ab9bfccbb7c2ee8f94fb25ed5410",
+ "chksum_sha256": "58455c816186626e36f39ad71466d285cc9649cfc05f8fd1fed470777d02a8a8",
"format": 1
},
{
@@ -6189,13 +6147,6 @@
"format": 1
},
{
- "name": "playbooks/profiler-services.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "8dc6ac1e8fb08cd3b641af14786261da25b85d6fa002895dac86dbc7d4f9f247",
- "format": 1
- },
- {
"name": "playbooks/device_administration_authentication_rules.yml",
"ftype": "file",
"chksum_type": "sha256",
@@ -6234,7 +6185,7 @@
"name": "playbooks/credentials.template",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c58d7a9ce7db850d4e382275f2504e9ce777b2355493aed04034e07f385bc594",
+ "chksum_sha256": "b5db043788f88104f89c0273aece227d6c4fc9cbe1a1ac0d993bc81763b958bd",
"format": 1
},
{
@@ -6276,7 +6227,7 @@
"name": "docs/conf.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "11c3f508b7f7472dd6aed3df9a989bb299114020c6a9b5bd451270d89f51e7cd",
+ "chksum_sha256": "98701ee406dc6461c7733aa12f22d2d8b4ba3036735a51f1c532476a3a9ea284",
"format": 1
},
{
@@ -6318,14 +6269,14 @@
"name": "changelogs/changelog.yaml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "641d15f1a652ed2f9fff6e80be25bcdc1667fa74913184d89d3617ed55f03119",
+ "chksum_sha256": "1193073224fb370f3d397b81858a7bda59568a510fa6c8e925f2b29479326d20",
"format": 1
},
{
"name": "README.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6c61f4c1df719abe5ad978ed29ef55403e10e8e1483d28a36ec0e09bf1be3e26",
+ "chksum_sha256": "e0770ec263df253ef1ee1b8f727e1e03c18f8c1198efbd85d7ed1c63006b3b4a",
"format": 1
},
{
@@ -6353,7 +6304,7 @@
"name": ".github/workflows/sanity_tests.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b187bd09d1863a610a4ffa47ff3976c4686c01fc39d547fd7b844aea1a4d592a",
+ "chksum_sha256": "dadf3d50392de4f33e091cf5947f4cf8f4ba153a95b63026e6d8eae8214ebd69",
"format": 1
},
{
@@ -6392,13 +6343,6 @@
"format": 1
},
{
- "name": "hosts",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3831686ce8b3b790ed5e77211eeb02bac1a6ab9bfccbb7c2ee8f94fb25ed5410",
- "format": 1
- },
- {
"name": ".vscode",
"ftype": "dir",
"chksum_type": null,
@@ -6409,7 +6353,7 @@
"name": ".vscode/settings.json",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1",
+ "chksum_sha256": "ff058b88424cd36c92374f3465470d0c24191746d224d3729d623881464c651e",
"format": 1
},
{
diff --git a/ansible_collections/cisco/ise/MANIFEST.json b/ansible_collections/cisco/ise/MANIFEST.json
index 030ef2e86..81f5e1e9f 100644
--- a/ansible_collections/cisco/ise/MANIFEST.json
+++ b/ansible_collections/cisco/ise/MANIFEST.json
@@ -2,7 +2,7 @@
"collection_info": {
"namespace": "cisco",
"name": "ise",
- "version": "2.5.12",
+ "version": "2.8.0",
"authors": [
"Rafael Campos <rcampos@altus.cr>",
"William Astorga <wastorga@altus.cr>",
@@ -21,7 +21,7 @@
"license": [],
"license_file": "LICENSE",
"dependencies": {
- "ansible.utils": ">=2.0.0,<3.0"
+ "ansible.utils": ">=2.0.0,<4.0"
},
"repository": "https://github.com/CiscoISE/ansible-ise",
"documentation": "https://ciscoise.github.io/ansible-ise/",
@@ -32,7 +32,7 @@
"name": "FILES.json",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "47d1392f23cc9333d6ad73d356e9094757167b3bbfc78e961a70849cafc42752",
+ "chksum_sha256": "43d93ef4489b0ae7fbc8e57931e7dece5b2d87c9e3cdbae66359cce957ce2875",
"format": 1
},
"format": 1
diff --git a/ansible_collections/cisco/ise/README.md b/ansible_collections/cisco/ise/README.md
index f3278584f..a6471334e 100644
--- a/ansible_collections/cisco/ise/README.md
+++ b/ansible_collections/cisco/ise/README.md
@@ -39,7 +39,7 @@ This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enab
### Using the collection on previous Cisco ISE versions
-As stated before, the collection has been tested and supports Cisco ISE 3.1_Patch_1.
+As stated before, the collection has been tested and supports Cisco ISE 3.2_beta.
It may work with Cisco ISE version 3.0, but it is not officially supported.
@@ -50,7 +50,8 @@ The following table shows the supported versions.
| Cisco ISE version | Ansible "cisco.ise" version | Python "ciscoisesdk" version |
|-------------------|------------------------------|------------------------------|
| 3.1.0 | 2.0.0 | 1.2.0 |
-| 3.1_Patch_1 | 2.5.12 | 2.0.8 |
+| 3.1_Patch_1 | 2.5.16 | 2.0.10 |
+| 3.2_beta | 2.8.0 | 2.1.1 |
If your Ansible collection is older please consider updating it first.
*Notes*:
@@ -87,10 +88,11 @@ export ISE_HOSTNAME=<A.B.C.D>
export ISE_USERNAME=<username>
export ISE_PASSWORD=<password>
export ISE_VERIFY=False # optional, defaults to True
-export ISE_VERSION=3.1_Patch_1 # optional, defaults to 3.1_Patch_1
+export ISE_VERSION=3.2_beta # optional, defaults to 3.2_beta
export ISE_WAIT_ON_RATE_LIMIT=True # optional, defaults to True
export ISE_USES_API_GATEWAY=True # optional, defaults to True
export ISE_DEBUG=False # optional, defaults to False
+export ISE_SINGLE_REQUEST_TIMEOUT:60 # optional, defaults to 60
```
Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings:
@@ -123,11 +125,12 @@ ise_hostname: <A.B.C.D>
ise_username: <username>
ise_password: <password>
ise_verify: False # optional, defaults to True
-ise_version: 3.1_Patch_1 # optional, defaults to 3.1_Patch_1
+ise_version: 3.2_beta # optional, defaults to 3.2_beta
ise_wait_on_rate_limit: True # optional, defaults to True
ise_debug: False # optional, defaults to False
ise_uses_api_gateway: True # optional, defaults to True
ise_uses_csrf_token: False # optional, defaults to False
+ise_single_request_timeout: 60 # optional, defaults to 60
```
Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings:
@@ -172,11 +175,12 @@ ise_hostname: <A.B.C.D>
ise_username: <username>
ise_password: <password>
ise_verify: False # optional, defaults to True
-ise_version: 3.1_Patch_1 # optional, defaults to 3.1_Patch_1
+ise_version: 3.2_beta # optional, defaults to 3.2_beta
ise_wait_on_rate_limit: True # optional, defaults to True
ise_debug: False # optional, defaults to False
ise_uses_api_gateway: True # optional, defaults to True
ise_uses_csrf_token: False # optional, defaults to False
+ise_single_request_timeout: 60 # optional, defaults to 60
```
Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings:
diff --git a/ansible_collections/cisco/ise/changelogs/changelog.yaml b/ansible_collections/cisco/ise/changelogs/changelog.yaml
index cbe35b4b8..929f94bb5 100644
--- a/ansible_collections/cisco/ise/changelogs/changelog.yaml
+++ b/ansible_collections/cisco/ise/changelogs/changelog.yaml
@@ -917,6 +917,63 @@ releases:
2.5.12:
release_date: "2023-01-09"
changes:
- release_date: Change is detected in a better way.
+ release_summary: Change is detected in a better way.
bugfixes:
- - network_access_authorization_rules - recognizes when there are changes. \ No newline at end of file
+ - network_access_authorization_rules - recognizes when there are changes.
+ 2.5.13:
+ release_date: "2023-07-25"
+ changes:
+ release_summary: Several bugfixes in modules.
+ bugfixes:
+ - cisco.ise.mnt_session_active_count_info ise_reponse is null fixed.
+ - Cannot get cisco.ise.rest_id_store to work fixed.
+ - System Certificate Update does not work but always reports Object already present temporary solution.
+ - node_deployment tasks fail because of timeout, adding new collection param.
+ 2.5.14:
+ release_date: "2023-08-10"
+ changes:
+ release_summary: support for none value.
+ bugfixes:
+ - system_certificate - added support for none value in the used_by param.
+ 2.5.15:
+ release_date: "2023-08-16"
+ changes:
+ release_summary: Fixed get_object_by_id.
+ bugfixes:
+ - system_certificate - fixed get_object_by_id response.
+ 2.5.16:
+ release_date: "2023-09-26"
+ changes:
+ release_summary: Fixed active_directory_groups_by_domain_Info.
+ bugfixes:
+ - Cannot get cisco.ise.active_directory_groups_by_domain_info to work.
+ 2.6.0:
+ release_date: "2023-11-07"
+ changes:
+ release_summary: ansible-ise now support 3.2_beta
+ minor_changes:
+ - Services included configuration, edda, dataconnect_services, subscriber.
+ 2.6.1:
+ release_date: "2023-11-09"
+ changes:
+ release_summary: Update to use ciscoisesdk v2.1.1 or newer
+ bugfixes:
+ - Updated to use ciscoisesdk v2.1.1 or newer fixing ciscoisesdk problem.
+ 2.6.2:
+ release_date: "2023-11-21"
+ changes:
+ release_summary: Added missing import
+ bugfixes:
+ - Added missing import re in endpoint module
+ 2.7.0:
+ release_date: "2023-11-21"
+ changes:
+ release_summary: Galaxy updated.
+ minor_changes:
+ - cisco.ise collection now supports ansible.utils v3
+ 2.8.0:
+ release_date: "2024-03-19"
+ changes:
+ release_summary: Changes the minimum supported version of Ansible to v2.14.0
+ minor_changes:
+ - Changes the minimum supported version from Ansible v2.9.10 to v2.14.0 \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/docs/conf.py b/ansible_collections/cisco/ise/docs/conf.py
index e2c2539dd..f265f2d6b 100644
--- a/ansible_collections/cisco/ise/docs/conf.py
+++ b/ansible_collections/cisco/ise/docs/conf.py
@@ -15,7 +15,6 @@ __metaclass__ = type
# add these directories to sys.path here. If the directory is relative to the
# documentation root, use os.path.abspath to make it absolute, like shown here.
#
-import datetime
import os
import sys
sys.path.insert(0, os.path.abspath('../plugins/plugin_utils/'))
diff --git a/ansible_collections/cisco/ise/hosts b/ansible_collections/cisco/ise/hosts
deleted file mode 100644
index a05461e33..000000000
--- a/ansible_collections/cisco/ise/hosts
+++ /dev/null
@@ -1,8 +0,0 @@
-[ise_servers]
-ise_server
-
-#[ise]
-#localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python
-
-#[ise:vars]
-#cloud_provider = aws
diff --git a/ansible_collections/cisco/ise/meta/runtime.yml b/ansible_collections/cisco/ise/meta/runtime.yml
index 1f18fd726..bcb6dcedc 100644
--- a/ansible_collections/cisco/ise/meta/runtime.yml
+++ b/ansible_collections/cisco/ise/meta/runtime.yml
@@ -1,2 +1,2 @@
---
-requires_ansible: '>=2.9.10' \ No newline at end of file
+requires_ansible: '>=2.14.0' \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/aws_deployment.yml b/ansible_collections/cisco/ise/playbooks/aws_deployment.yml
index 3ad6dc5a0..8cd9a74f8 100644
--- a/ansible_collections/cisco/ise/playbooks/aws_deployment.yml
+++ b/ansible_collections/cisco/ise/playbooks/aws_deployment.yml
@@ -1,6 +1,6 @@
---
- name: AWS ISE Deployment Playbook
- hosts: localhost
+ hosts: ise
connection: local
vars:
ise_username: admin
@@ -10,16 +10,14 @@
ise_dns_server: 208.67.220.220
ise_timezone: America/Costa_Rica
- aws_ise_ami: ami-0ffd69a117dbcbb9e
+ aws_ise_ami: ami-0a8b4f863885c3372
aws_vpc_name: ISE VPC
aws_vpc_cidr: 10.10.0.0/16
aws_subnet_cidr: 10.10.1.0/24
aws_region: us-west-2
aws_public_access_cidr: 0.0.0.0/0
- aws_keypair_name: ise-testing-ansible
+ aws_keypair_name: ise_deployment
aws_instance_type: c5.4xlarge
- aws_cound: 1
roles:
- cisco.ise.aws_deployment
- \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/azure_deployment.yml b/ansible_collections/cisco/ise/playbooks/azure_deployment.yml
deleted file mode 100644
index 5a1ea11da..000000000
--- a/ansible_collections/cisco/ise/playbooks/azure_deployment.yml
+++ /dev/null
@@ -1,46 +0,0 @@
----
-- name: ISE Deployment Playbook
- hosts: localhost
- connection: local
- vars:
- ise_deployment_type: single
- ise_personas: ["pan-1", "pan-2", "mnt-1", "mnt-2", "psn-1", "psn-2"]
- ise_base_hostname: ISE
- ise_username: admin
- ise_password: P@sbg1234
- ise_ntp_server: 10.10.0.1
- ise_dns_server: 208.67.220.220
- ise_domain: sstcloud.com
- ise_timezone: America/Costa_Rica
-
-
- az_rg_name: ISE-RG-ANSIBLE
- az_location: southcentralus
- az_network_name: ISE-NETWORK
- az_subnet_name: ISE-SUBNET
- az_network_cidr:
- - "10.1.0.0/16"
- - "172.100.0.0/16"
- az_network_dns:
- - "127.0.0.1"
- - "127.0.0.2"
- az_subnet_cidr: 10.1.0.0/24
- az_securitygroup_name: ISE-SECURITY-GROUP
- az_public_access_cidr:
- - '174.109.158.0/24'
- - '174.109.159.0/24'
- az_interface_name: ISE-INTERFACE
- az_vm_username: ise-user
- az_vm_name: ISE-VM
- az_vm_key: "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDOXXnPveNXDONNioMmDmS58OiKPG3vpHAbDSnpu0ZrXVR6xMdF9DrAIxdTTcCQVPcRmT92paAzL6qdNLG2b9aEAXZ6/0l73LKI2jKbE9jjQULNRxWkr6fRWr58Wza7MlR+mN/DUepxIieir5W9R6c7F+2gIVOSLRMOiymqo2v/WK5jCIk20SSUuh6TexxZu6nlj4eBYSmY91tb5aIG6E72fSfJ+VU2DuanN1qv4duLPYjb1nCG4LlxQQWDTig60AYTJ3h0CkqJtNhjazqUJrTCwEy3NsNthM9UTHxnKxl0ADNZ/hZUAcFI55k2CaTovBIIMAKItMt39b6NN5bSTCIUNw1QL4Q8CLd6vE7asYOkRXTrqm6to6VH+dzKSmIMHnAIkrGGQyAupABXbqsBOz1u2yP6d1YP8mN4/mDPCdVHWGuaz8XGe5K+w+i0a2LU26MEfzyVyJI0I6a/636zL7LV+WxRN1pTqy5M/4jCUoU4MdsUw5TIYAyG/Cx0LShUTxThblxnr9ms5VGn/wexoR/y+nMyqhR0Wm0VN8zEl4AsR+Gjyc2g6jpQlRcZTaMT358qw8VUsjhS6l59oO3bYH3qWFA3R2paL6fdmdTsSmhysWuPAm5Cy+22OkF6tD46mnNNoMfWv/LQBcswsIbuB1cEdLDqN02Je1opipJizy/bXw== root@Bryans-MacBook-Air.local"
- roles:
- - cisco.ise.ise_deployment_in_azure
-
-# tasks:
-# - name: test
-# ansible.builtin.set_fact:
-# test: "{{a}}"
-# test1: "{{(a|int)+2}}"
-# - name: Output public IP
-# debug:
-# msg: "{{test}} - {{test1}}" \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/b.yml b/ansible_collections/cisco/ise/playbooks/b.yml
deleted file mode 100644
index a061dc6eb..000000000
--- a/ansible_collections/cisco/ise/playbooks/b.yml
+++ /dev/null
@@ -1,130 +0,0 @@
----
-- hosts: ise_servers
- vars_files:
- - credentials.yml
- vars:
- ise_login: &ise_login
- ise_hostname: "{{ ise_hostname }}"
- ise_username: "{{ ise_username }}"
- ise_password: "{{ ise_password }}"
- ise_verify: "{{ ise_verify }}"
- ise_version: "{{ ise_version }}"
- ise_debug: "{{ ise_debug }}"
- gather_facts: false
- tasks:
- - name: Create Endpoint
- cisco.ise.endpoint:
- <<: *ise_login
- state: present
- #state: absent
- description: ansible test
- mac: "50:00:00:01:00:16"
- name: "Ansible name"
- #mac: "50-00-00-04-C3-95"
- register: result
-
- #- name: Get all Endpoint
- # cisco.ise.endpoint_info:
- # <<: *ise_login
- # page: 1
- # size: 20
- #sortasc: string
- # register: result
-
- # - name: Get Endpoint by id
- # cisco.ise.endpoint_info:
- # <<: *ise_login
- # id: 69142550-2576-11ed-990e-4a16cf330648
- # register: result
-
- # - name: Get all SGt
- # cisco.ise.sgt_info:
- # <<: *ise_login
- # size: 5
- # sortasc: name
- # register: result
-
- # - name: Get SGt by id
- # cisco.ise.sgt_info:
- # <<: *ise_login
- # id: 4d482be5-2863-4015-8ea4-46c00d9e199b
- # register: result
-
- # - name: STG
- # cisco.ise.sgt:
- # <<: *ise_login
- # # ise_uses_api_gateway: "{{ise_uses_api_gateway}}"
- # # ise_uses_csrf_token: "{{ise_uses_csrf_token}}"
- # state: present
- # name: teststg_ansible
- # value: -1
- # description: teststg description ANSIBLE number 2
- # register: result
-
-# - name: Create STG
-# hosts: ise
-# vars_files:
-# - credentials.yml
-# gather_facts: false
-# tasks:
-# - name: Create STG
-# cisco.ise.sgt:
-# <<: *ise_login
-# # ise_uses_api_gateway: "{{ise_uses_api_gateway}}"
-# # ise_uses_csrf_token: "{{ise_uses_csrf_token}}"
-# state: present
-# name: teststg ->teststg3
-# value: -1
-# description: teststg description -> teststg3 description
-# register: result
-
- # - name: Create network device
- # loop_control:
- # loop_var: device
- # cisco.ise.network_device:
- # <<: *ise_login
- # state: present
- # name: "{{device.name}}"
- # description: "{{device.description}}"
- # coaPort: "{{device.coa_port}}"
- # NetworkDeviceGroupList: "{{device.network_device_group_list}}"
- # NetworkDeviceIPList: "{{device.network_device_ip_list}}"
- # authenticationSettings:
- # radiusSharedSecret: "{{device.shared_secret}}"
- # loop: "{{network_devices}}"
- # when: "network_devices is defined"
- # register: result
-
-
- # - name: Create network device single
- # cisco.ise.network_device:
- # <<: *ise_login
- # state: present
- # #state: absent
- # name: "ISE_EST_Local_Host_TEST"
- # description: "example nd"
- # coaPort: "0"
- # NetworkDeviceGroupList:
- # - "Location#All Locations"
- # - "Device Type#All Device Types"
- # # - "IPSEC#Is IPSEC Device"
- # NetworkDeviceIPList:
- # - ipaddress: "127.0.0.1"
- # mask: 0
- # authenticationSettings:
- # radiusSharedSecret: "RADIUS"
- # register: result
-
- # - name: Get all Node Deployment
- # cisco.ise.node_deployment_info:
- # <<: *ise_login
- # #hostname: ise
- # register: result
-
- - name: Debug result.
- ansible.builtin.debug:
- var: result
-
-
-
-#authorization_profile \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/credentials.template b/ansible_collections/cisco/ise/playbooks/credentials.template
index b6a7cff1e..6cafc452c 100644
--- a/ansible_collections/cisco/ise/playbooks/credentials.template
+++ b/ansible_collections/cisco/ise/playbooks/credentials.template
@@ -3,7 +3,7 @@ ise_hostname: <A.B.C.D>
ise_username: <username>
ise_password: <password>
ise_verify: False # optional, defaults to True
-ise_version: 3.1.1 # optional, defaults to 3.1.1
+ise_version: 3.2_beta # optional, defaults to 3.2_beta
ise_wait_on_rate_limit: True # optional, defaults to True
ise_debug: False # optional, defaults to False
ise_uses_api_gateway: True # optional, defaults to True
diff --git a/ansible_collections/cisco/ise/playbooks/credentials.yml b/ansible_collections/cisco/ise/playbooks/credentials.yml
deleted file mode 100644
index ebf5f9bf3..000000000
--- a/ansible_collections/cisco/ise/playbooks/credentials.yml
+++ /dev/null
@@ -1,19 +0,0 @@
----
-ise_hostname: 198.18.133.27
-ise_username: admin
-ise_password: 991545 # session ID
-ise_verify: False # optional, defaults to True
-ise_version: 3.1_Patch_1 # optional, defaults to 3.1.1
-ise_wait_on_rate_limit: True # optional, defaults to True
-ise_debug: True # optional, defaults to False
-ise_uses_api_gateway: True # optional, defaults to True
-
-
-# export ISE_HOSTNAME="198.18.133.27"
-# export ISE_USERNAME="admin"
-# export ISE_PASSWORD="995210"
-# export ISE_VERIFY=False
-# export ISE_VERSION="3.1_Patch_1"
-# export ISE_WAIT_ON_RATE_LIMIT=True
-# export ISE_USES_API_GATEWAY=True
-# export ISE_DEBUG=True \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers b/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers
index c6c726fcb..5153435b4 100644
--- a/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers
+++ b/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers
@@ -3,7 +3,7 @@
ise_hostname: "198.18.133.27"
ise_username: "admin"
ise_password: "910457"
-ise_version: "3.1.1"
+ise_version: "3.2_beta"
ise_verify: False
ise_debug: True
ise_uses_api_gateway: True
diff --git a/ansible_collections/cisco/ise/playbooks/hosts b/ansible_collections/cisco/ise/playbooks/hosts
index a05461e33..3e82285e2 100644
--- a/ansible_collections/cisco/ise/playbooks/hosts
+++ b/ansible_collections/cisco/ise/playbooks/hosts
@@ -1,8 +1,8 @@
[ise_servers]
ise_server
-#[ise]
-#localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python
+[ise]
+localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python
-#[ise:vars]
-#cloud_provider = aws
+[ise:vars]
+cloud_provider = aws
diff --git a/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml b/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml
index e36ea11a7..2e06f0e61 100644
--- a/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml
+++ b/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml
@@ -23,7 +23,7 @@
# id: d704e911-a916-11eb-8830-2ec507028ea8
# register: result
- - name: Create or update an network_access_authorization_rules
+ - name: Create a network_access_authorization_rules
cisco.ise.network_access_authorization_rules:
ise_hostname: "{{ ise_hostname }}"
ise_username: "{{ ise_username }}"
@@ -51,6 +51,39 @@
policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
register: result
- - name: Print result
+ - name: Print create result
+ ansible.builtin.debug:
+ var: result
+
+ - name: Update a network_access_authorization_rule
+ cisco.ise.network_access_authorization_rules:
+ ise_hostname: "{{ ise_hostname }}"
+ ise_username: "{{ ise_username }}"
+ ise_password: "{{ ise_password }}"
+ ise_verify: "{{ ise_verify }}"
+ state: present
+ rule:
+ default: false
+ name: Test2
+ hitCounts: 00
+ rank: 00
+ state: disabled
+ condition:
+ conditionType: ConditionReference
+ isNegate: false
+ dictionaryName: Network Access
+ attributeName: EapAuthentication
+ operator: equals
+ attributeValue: EAP-MSCHAPv2
+ name: EAP-MSCHAPv2
+ id: c456a490-0429-4fd4-91d7-efd1eb1f855a
+ profile:
+ - PermitAccess
+ securityGroup: Employee
+ policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
+ id: 9a2ff8d6-e086-5af5-ab4b-78e10c7adf61
+ register: result
+
+ - name: Print update result
ansible.builtin.debug:
var: result
diff --git a/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml b/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml
index 4556a1de5..22439f41f 100644
--- a/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml
+++ b/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml
@@ -33,15 +33,16 @@
name: Endstation condition 1
description: Optional description
conditionType: EndstationCondition
- ipAddrList:
- - 1.1.1.1
- - 2.2.2.2
- macAddrList:
- - 00-0E-A6-A7-63-F7,00-0E-A6-A7-63-F8
- - 00-0E-A6-A7-63-F7,-ANY-
- - -ANY-,00-0E-A6-A7-63-F8
- cliDnisList:
- - TBD
+ conditions:
+ - ipAddrList:
+ - 1.1.1.1
+ - 2.2.2.2
+ - macAddrList:
+ - 00-0E-A6-A7-63-F7,00-0E-A6-A7-63-F8
+ - 00-0E-A6-A7-63-F7,-ANY-
+ - -ANY-,00-0E-A6-A7-63-F8
+ - cliDnisList:
+ - TBD
register: result
- name: Print result
diff --git a/ansible_collections/cisco/ise/playbooks/network_device.yml b/ansible_collections/cisco/ise/playbooks/network_device.yml
index 47ec35d13..a1a654da6 100644
--- a/ansible_collections/cisco/ise/playbooks/network_device.yml
+++ b/ansible_collections/cisco/ise/playbooks/network_device.yml
@@ -41,16 +41,6 @@
mask: 32
register: result
- ## Using environment variables
- - name: Create or update a network device
- cisco.ise.network_device:
- state: present
- name: ISE_EST_Local_Host_6
- NetworkDeviceIPList:
- - ipaddress: 127.16.0.1
- mask: 32
- register: result
-
# - name: Delete a network device by id
# cisco.ise.network_device:
# ise_hostname: "{{ ise_hostname }}"
diff --git a/ansible_collections/cisco/ise/playbooks/playbookstest.yml b/ansible_collections/cisco/ise/playbooks/playbookstest.yml
deleted file mode 100644
index c395d1796..000000000
--- a/ansible_collections/cisco/ise/playbooks/playbookstest.yml
+++ /dev/null
@@ -1,183 +0,0 @@
----
-- hosts: ise_servers
- gather_facts: false
- vars:
- itemTest:
- name: "Cisco_Ansible_Test_09_12"
- accessType: "ACCESS_ACCEPT"
- description: "Test"
- authzProfileType: "SWITCH"
- vlan:
- nameID: "172_28_1_0-VN_IOT"
- tagID: 1
- trackMovement: false
- agentlessPosture: false
- serviceTemplate: false
- profileName: "Cisco"
- tasks:
- ## https://github.com/CiscoISE/ansible-ise/issues/72
- ## post 400
- # - name: Get all Network Access Authorization Rules
- # cisco.ise.network_access_authorization_rules:
- # state: present
- # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
- # rule:
- # default: false
- # #id: d9e67664-799d-4ad9-a407-8365117c18e5
- # name: Ansible B TEST
- # hitCounts: 0
- # rank: 0
- # state: enabled
- # condition:
- # conditionType: ConditionAndBlock
- # isNegate: false
- # children:
- # - conditionType: ConditionReference
- # isNegate: false
- # name: Wireless_Access
- # id: ff6008e0-5c35-48a3-9fab-e0e709983369
- # # description: >-
- # # Default condition used to match any authentication request from Cisco
- # # Wireless LAN Controller.
- # - conditionType: ConditionAttributes
- # isNegate: false
- # dictionaryName: IdentityGroup
- # attributeName: Name
- # operator: equals
- # #dictionaryValue: null
- # attributeValue: 'Endpoint Identity Groups:Blocked List'
- # profile:
- # - Blackhole_Wireless_Access
- # #securityGroup: null
- # register: result
-
- # - name: Get all Network Access Authorization Rules
- # cisco.ise.network_access_authorization_rules_info:
- # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
- # register: result
-
- ## https://github.com/CiscoISE/ansible-ise/issues/74
-
- # - name: Create or update Authorization profile
- # cisco.ise.authorization_profile:
- # name: "{{ itemTest.name }}"
- # accessType: "{{ itemTest.accessType }}"
- # description: "{{ itemTest.description }}"
- # authzProfileType: "{{ itemTest.authzProfileType }}"
- # vlan:
- # nameID: "{{ itemTest.vlan.nameID }}"
- # tagID:
- # "{{itemTest.vlan.tagID|int}}"
- # trackMovement: "{{ itemTest.trackMovement }}"
- # agentlessPosture: "{{ itemTest.agentlessPosture }}"
- # serviceTemplate: "{{ itemTest.serviceTemplate }}"
- # profileName: "{{ itemTest.profileName }}"
- # register: result
-
- # - name: Get all Authorization Profile
- # cisco.ise.authorization_profile_info:
- # name: Cisco_Temporal_Onboard
- # register: result
-
- # - name: debug
- # debug:
- # msg: "{{ itemTest.vlan.tagID | int == 0 }}"
-
- # - name: debug
- # debug:
- # msg: |
- # {{ item.vlanID | int }}
- # loop:
- # - { "vlanID": "1" }
- # - { "vlanID": "2" }
- # - { "vlanID": 2 }
-
- # - name: debug
- # debug:
- # var: |-
- # {{ item.vlanID | int }}
- # loop:
- # - { "vlanID": 1 }
- # - { "vlanID": "2" }
-
- ## https://github.com/CiscoISE/ansible-ise/issues/76
- ## Node group creation is not idempotent
- ## fatal: [localhost]: FAILED! => {"changed": false, "msg": "An error occured when executing operation. The error was: [409] - The request could not be processed because it conflicts with some established rule of the system.\n{\n \"error\" : {\n \"message\" : \"NodeGroup 'TestGroup1' already exist.\"\n },\n \"version\" : \"1.0.0\"\n}"}
- # - name: Create test node group.
- # cisco.ise.node_group:
- # state: present
- # description: "Testing creation and idempotency"
- # name: "TesAnsible76"
- # nodeGroupName: "TesAnsible76"
- # forceDelete: true
- # register: result
-
- # - name: Get all Node Group
- # cisco.ise.node_group_info:
- # nodeGroupName: "NodeGroup2"
- # register: result
-
- ##https://github.com/CiscoISE/ansible-ise/issues/79
- ## Cannot update
- # - name: Create or update an network_access_authentication_rules
- # cisco.ise.network_access_authentication_rules:
- # state: present
- # rule:
- # default: false
- # name: TestAnsibleIssue79
- # hitCounts: 00
- # rank: 0
- # state: enabled
- # #id: b086e85e-6118-4b67-8efc-05d692423afb
- # condition:
- # conditionType: ConditionReference
- # isNegate: false
- # dictionaryName: Network Access
- # attributeName: EapAuthentication
- # operator: equals
- # attributeValue: EAP-MSCHAPv2
- # name: EAP-MSCHAPv2
- # id: c456a490-0429-4fd4-91d7-efd1eb1f855a
- # ifAuthFail: REJECT
- # ifUserNotFound: REJECT
- # ifProcessFail: DROP
- # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
- # register: result
-
-
- ##https://github.com/CiscoISE/ansible-ise/issues/77
- ## Get error
- ## node_group_node_info
- # - name: Get all Node Group Node
- # cisco.ise.node_group_node_info:
- # nodeGroupName: TesAnsible76
- # register: result
-
- ##https://github.com/CiscoISE/ansible-ise/issues/81
- ## Unable to update Authorization Policies
- ##network_access_authorization_rules
- - name: CRUD
- cisco.ise.network_access_authorization_rules:
- state: present
- #state: absent
- rule:
- default: false
- name: TestAnsibleIssue81
- rank: 0
- state: enabled
- condition:
- conditionType: ConditionAttributes
- isNegate: false
- dictionaryName: IdentityGroup
- attributeName: Name
- operator: equals
- attributeValue: 'Endpoint Identity Groups:IAC_Lab1'
- profile:
- - Blackhole_Wireless_Access
- #securityGroup: BYOD
- policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
- register: result
-
- - name: Print Authorization profile
- ansible.builtin.debug:
- var: result \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/playbooks/profiler-services.yml b/ansible_collections/cisco/ise/playbooks/profiler-services.yml
deleted file mode 100644
index 85d9d9018..000000000
--- a/ansible_collections/cisco/ise/playbooks/profiler-services.yml
+++ /dev/null
@@ -1,40 +0,0 @@
----
-# profiler_config:
-# # - netflow:
-# - dhcp:
-# interfaces:
-# - interface: 'GigabitEthernet0'
-# port: 67
-# # - dhcpSpan:
-# # - http:
-# - radius: {}
-# - nmap: {}
-# # - dns:
-# - snmpQuery:
-# retries: 2
-# timeout: 1000
-# eventTimeout: 30
-# # - snmpTrap:
-# - activeDirectory:
-# daysBeforeRescan: 1
-# # - pxgrid: {}
-
-profiler_config:
- #netflow: null
- dhcp:
- interfaces:
- - interface: GigabitEthernet 0
- port: 67
- #dhcpSpan: null
- #http: null
- radius: []
- nmap: []
- #dns: null
- snmpQuery:
- retries: 2
- timeout: 1000
- eventTimeout: 30
- #snmpTrap: null
- activeDirectory:
- daysBeforeRescan: 1
- #pxgrid: null \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/plugins/.DS_Store b/ansible_collections/cisco/ise/plugins/.DS_Store
new file mode 100644
index 000000000..874d3d2c6
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/.DS_Store
Binary files differ
diff --git a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
index c303d3b77..76f1adff1 100644
--- a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py
@@ -80,15 +80,12 @@ class ActionModule(ActionBase):
self._result.update(dict(ise_response={}))
ise = ISESDK(params=self._task.args)
+ response = ise.exec(
+ family="active_directory",
+ function='get_groups_by_domain',
+ params=self.get_object(self._task.args)
+ ).response['ERSActiveDirectoryGroups']
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if not name and not id:
- response = ise.exec(
- family="active_directory",
- function='get_groups_by_domain',
- params=self.get_object(self._task.args)
- ).response['ERSActiveDirectoryGroups']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/action/configuration.py
index b137aa8cc..de3fe1eff 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py
+++ b/ansible_collections/cisco/ise/plugins/action/configuration.py
@@ -32,97 +32,46 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- state=dict(type="str", default="present", choices=["present", "absent"]),
- id=dict(type="str"),
- isData=dict(type="bool"),
- isDefaultVlan=dict(type="bool"),
- lastUpdate=dict(type="str"),
- maxValue=dict(type="int"),
- name=dict(type="str"),
- vnId=dict(type="str"),
- vnName=dict(type="str"),
+ state=dict(type="str", default="present", choices=["present"]),
+ enableEPO=dict(type="bool"),
+ enableRCM=dict(type="bool"),
))
required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
+ ("state", "present", [], True),
]
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecVnVlanMapping(object):
+class Configuration(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
- id=params.get("id"),
- is_data=params.get("isData"),
- is_default_vlan=params.get("isDefaultVlan"),
- last_update=params.get("lastUpdate"),
- max_value=params.get("maxValue"),
- name=params.get("name"),
- vn_id=params.get("vnId"),
- vn_name=params.get("vnName"),
+ enable_epo=params.get("enableEPO"),
+ enable_rcm=params.get("enableRCM"),
)
def get_object_by_name(self, name):
- # NOTICE: Get does not support/work for filter by name with EQ
+ # NOTICE: Does not have a get by name method or it is in another action
result = None
- gen_items_responses = self.ise.exec(
- family="vn_vlan_mapping",
- function="get_vn_vlan_mappings_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- result = get_dict_result(items, 'name', name)
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
+ items = self.ise.exec(
+ family="configuration",
+ function="get_configuration"
+ ).response
+ result = get_dict_result(items, 'name', name)
return result
def get_object_by_id(self, id):
- try:
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="get_vn_vlan_mapping_by_id",
- handle_func_exception=False,
- params={"id": id}
- ).response['response']
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
+ # NOTICE: Does not have a get by id method or it is in another action
+ result = None
return result
def exists(self):
+ prev_obj = None
id_exists = False
name_exists = False
- prev_obj = None
o_id = self.new_object.get("id")
name = self.new_object.get("name")
if o_id:
@@ -135,8 +84,6 @@ class TrustsecVnVlanMapping(object):
_id = prev_obj.get("id")
if id_exists and name_exists and o_id != _id:
raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
it_exists = prev_obj is not None and isinstance(prev_obj, dict)
return (it_exists, prev_obj)
@@ -144,14 +91,8 @@ class TrustsecVnVlanMapping(object):
requested_obj = self.new_object
obj_params = [
- ("id", "id"),
- ("isData", "is_data"),
- ("isDefaultVlan", "is_default_vlan"),
- ("lastUpdate", "last_update"),
- ("maxValue", "max_value"),
- ("name", "name"),
- ("vnId", "vn_id"),
- ("vnName", "vn_name"),
+ ("enableEPO", "enable_epo"),
+ ("enableRCM", "enable_rcm"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -159,38 +100,13 @@ class TrustsecVnVlanMapping(object):
requested_obj.get(ansible_param))
for (ise_param, ansible_param) in obj_params)
- def create(self):
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="create_vn_vlan_mapping",
- params=self.new_object,
- ).response
- return result
-
def update(self):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="vn_vlan_mapping",
- function="update_vn_vlan_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
- def delete(self):
- id = self.new_object.get("id")
- name = self.new_object.get("name")
- result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="vn_vlan_mapping",
- function="delete_vn_vlan_mapping_by_id",
+ family="configuration",
+ function="update_configuration",
params=self.new_object
).response
return result
@@ -230,12 +146,11 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecVnVlanMapping(self._task.args, ise)
+ obj = Configuration(self._task.args, ise)
state = self._task.args.get("state")
response = None
-
if state == "present":
(obj_exists, prev_obj) = obj.exists()
if obj_exists:
@@ -249,19 +164,7 @@ class ActionModule(ActionBase):
response = prev_obj
ise.object_already_present()
else:
- ise_create_response = obj.create()
- (obj_exists, created_obj) = obj.exists()
- response = created_obj
- ise.object_created()
-
- elif state == "absent":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- obj.delete()
- response = prev_obj
- ise.object_deleted()
- else:
- ise.object_already_absent()
+ ise.fail_json("Object does not exists, plugin only has update")
self._result.update(dict(ise_response=response))
self._result.update(ise.exit_json())
diff --git a/ansible_collections/cisco/ise/plugins/action/configuration_info.py b/ansible_collections/cisco/ise/plugins/action/configuration_info.py
new file mode 100644
index 000000000..d3ed0d5fe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/configuration_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="configuration",
+ function='get_configuration',
+ params=self.get_object(self._task.args)
+ ).response
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/action/connector_config.py
index 3cb7209b8..8e124b7ed 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py
+++ b/ansible_collections/cisco/ise/plugins/action/connector_config.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -33,68 +33,54 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ additionalProperties=dict(type="dict"),
+ attributes=dict(type="dict"),
+ connectorName=dict(type="str"),
+ connectorType=dict(type="str"),
+ deltasyncSchedule=dict(type="dict"),
description=dict(type="str"),
- id=dict(type="str"),
- name=dict(type="str"),
- networkIdentities=dict(type="list"),
+ enabled=dict(type="bool"),
+ fullsyncSchedule=dict(type="dict"),
+ protocol=dict(type="str"),
+ skipCertificateValidations=dict(type="bool"),
+ url=dict(type="dict"),
))
required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
+ ("state", "present", ["connectorName"], True),
+ ("state", "absent", ["connectorName"], True),
]
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecNbarApp(object):
+class ConnectorConfig(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ additional_properties=params.get("additionalProperties"),
+ attributes=params.get("attributes"),
+ connector_name=params.get("connectorName"),
+ connector_type=params.get("connectorType"),
+ deltasync_schedule=params.get("deltasyncSchedule"),
description=params.get("description"),
- id=params.get("id"),
- name=params.get("name"),
- network_identities=params.get("networkIdentities"),
+ enabled=params.get("enabled"),
+ fullsync_schedule=params.get("fullsyncSchedule"),
+ protocol=params.get("protocol"),
+ skip_certificate_validations=params.get("skipCertificateValidations"),
+ url=params.get("url"),
)
def get_object_by_name(self, name):
- # NOTICE: Get does not support/work for filter by name with EQ
- result = None
- gen_items_responses = self.ise.exec(
- family="nbar_app",
- function="get_nbar_apps_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- result = get_dict_result(items, 'name', name)
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
- return result
-
- def get_object_by_id(self, id):
try:
result = self.ise.exec(
- family="nbar_app",
- function="get_nbar_app_by_id",
+ family="edda",
+ function="get_connector_config_by_connector_name",
+ params={"connector_name": name},
handle_func_exception=False,
- params={"id": id}
).response['response']
+ result = get_dict_result(result, 'connectorName', name)
except (TypeError, AttributeError) as e:
self.ise.fail_json(
msg=(
@@ -107,8 +93,11 @@ class TrustsecNbarApp(object):
)
except Exception:
result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
+ return result
+
+ def get_object_by_id(self, id):
+ # NOTICE: Does not have a get by id method or it is in another action
+ result = None
return result
def exists(self):
@@ -116,7 +105,7 @@ class TrustsecNbarApp(object):
name_exists = False
prev_obj = None
o_id = self.new_object.get("id")
- name = self.new_object.get("name")
+ name = self.new_object.get("connectorName")
if o_id:
prev_obj = self.get_object_by_id(o_id)
id_exists = prev_obj is not None and isinstance(prev_obj, dict)
@@ -127,8 +116,6 @@ class TrustsecNbarApp(object):
_id = prev_obj.get("id")
if id_exists and name_exists and o_id != _id:
raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
it_exists = prev_obj is not None and isinstance(prev_obj, dict)
return (it_exists, prev_obj)
@@ -136,10 +123,17 @@ class TrustsecNbarApp(object):
requested_obj = self.new_object
obj_params = [
+ ("additionalProperties", "additional_properties"),
+ ("attributes", "attributes"),
+ ("connectorName", "connector_name"),
+ ("connectorType", "connector_type"),
+ ("deltasyncSchedule", "deltasync_schedule"),
("description", "description"),
- ("id", "id"),
- ("name", "name"),
- ("networkIdentities", "network_identities"),
+ ("enabled", "enabled"),
+ ("fullsyncSchedule", "fullsync_schedule"),
+ ("protocol", "protocol"),
+ ("skipCertificateValidations", "skip_certificate_validations"),
+ ("url", "url"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -149,8 +143,8 @@ class TrustsecNbarApp(object):
def create(self):
result = self.ise.exec(
- family="nbar_app",
- function="create_nbar_app",
+ family="edda",
+ function="create_connector_config",
params=self.new_object,
).response
return result
@@ -159,12 +153,12 @@ class TrustsecNbarApp(object):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
+ if not name:
+ name_ = self.get_object_by_id(id).get("name")
+ self.new_object.update(dict(name=name_))
result = self.ise.exec(
- family="nbar_app",
- function="update_nbar_app_by_id",
+ family="edda",
+ function="update_connector_config_by_connector_name",
params=self.new_object
).response
return result
@@ -173,12 +167,12 @@ class TrustsecNbarApp(object):
id = self.new_object.get("id")
name = self.new_object.get("name")
result = None
- if not id:
- id_ = self.get_object_by_name(name).get("id")
- self.new_object.update(dict(id=id_))
+ if not name:
+ name_ = self.get_object_by_id(id).get("name")
+ self.new_object.update(dict(name=name_))
result = self.ise.exec(
- family="nbar_app",
- function="delete_nbar_app_by_id",
+ family="edda",
+ function="delete_connector_config_by_connector_name",
params=self.new_object
).response
return result
@@ -218,7 +212,7 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecNbarApp(self._task.args, ise)
+ obj = ConnectorConfig(self._task.args, ise)
state = self._task.args.get("state")
diff --git a/ansible_collections/cisco/ise/plugins/action/connector_config_info.py b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py
new file mode 100644
index 000000000..05bd40cbe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py
@@ -0,0 +1,101 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ connectorName=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ connector_name=params.get("connectorName"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("connectorName")
+ if name:
+ response = ise.exec(
+ family="edda",
+ function='get_connector_config_by_connector_name',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
+ if not name and not id:
+ response = ise.exec(
+ family="edda",
+ function='get_connector_config',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py
new file mode 100644
index 000000000..ffd19d387
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="dataconnect_services",
+ function='get_odbc_detail',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py
new file mode 100644
index 000000000..5d794c926
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="dataconnect_services",
+ function='get_dataconnect_service',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py
index ab7effb63..0fd96ad3e 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ password=dict(type="str", no_log=True),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ password=params.get("password"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_delete_sg_vn_mappings",
+ family="dataconnect_services",
+ function="update_dataconnect_password",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py
index f84f91108..f9db60ec8 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ passwordExpiresInDays=dict(type="int"),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ password_expires_in_days=params.get("passwordExpiresInDays"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_update_sg_vn_mappings",
+ family="dataconnect_services",
+ function="update_dataconnect_password_expiry",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py
index 95943d628..e7232ab0e 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py
+++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py
@@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ isEnabled=dict(type="bool"),
))
required_if = []
@@ -65,7 +65,7 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ is_enabled=params.get("isEnabled"),
)
return new_object
@@ -78,8 +78,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="virtual_network",
- function="bulk_create_virtual_networks",
+ family="dataconnect_services",
+ function="set_data_connect_service",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
index 8ef7ec09e..58e3d55d6 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
@@ -33,6 +32,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ identitySourceId=dict(type="str"),
identitySourceName=dict(type="str"),
ifAuthFail=dict(type="str"),
ifProcessFail=dict(type="str"),
@@ -58,6 +58,7 @@ class DeviceAdministrationAuthenticationRules(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ identity_source_id=params.get("identitySourceId"),
identity_source_name=params.get("identitySourceName"),
if_auth_fail=params.get("ifAuthFail"),
if_process_fail=params.get("ifProcessFail"),
@@ -133,6 +134,7 @@ class DeviceAdministrationAuthenticationRules(object):
requested_obj = self.new_object
obj_params = [
+ ("identitySourceId", "identity_source_id"),
("identitySourceName", "identity_source_name"),
("ifAuthFail", "if_auth_fail"),
("ifProcessFail", "if_process_fail"),
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
index c1a42a95c..2645800ce 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
index 97df92d65..3f32c7c94 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py
@@ -37,6 +37,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -70,6 +71,7 @@ class DeviceAdministrationConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -152,6 +154,7 @@ class DeviceAdministrationConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
index 895c4c6e2..38718ced2 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
index 570495d89..27f5b3401 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
index 502b5b6c3..10bcdc558 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py
@@ -38,7 +38,11 @@ argument_spec.update(dict(
id=dict(type="str"),
link=dict(type="dict"),
name=dict(type="str"),
- conditions=dict(type="list"),
+ deviceList=dict(type="list"),
+ cliDnisList=dict(type="list"),
+ ipAddrList=dict(type="list"),
+ macAddrList=dict(type="list"),
+ deviceGroupList=dict(type="list"),
))
required_if = [
@@ -59,7 +63,11 @@ class DeviceAdministrationNetworkConditions(object):
id=params.get("id"),
link=params.get("link"),
name=params.get("name"),
- conditions=params.get("conditions"),
+ device_list=params.get("deviceList"),
+ cli_dnis_list=params.get("cliDnisList"),
+ ip_addr_list=params.get("ipAddrList"),
+ mac_addr_list=params.get("macAddrList"),
+ device_group_list=params.get("deviceGroupList"),
)
def get_object_by_name(self, name):
@@ -124,7 +132,11 @@ class DeviceAdministrationNetworkConditions(object):
("id", "id"),
("link", "link"),
("name", "name"),
- ("conditions", "conditions"),
+ ("deviceList", "device_list"),
+ ("cliDnisList", "cli_dnis_list"),
+ ("ipAddrList", "ip_addr_list"),
+ ("macAddrList", "mac_addr_list"),
+ ("deviceGroupList", "device_group_list"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
index 35431f36e..e0ffd4d73 100644
--- a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py
@@ -40,6 +40,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -73,6 +74,7 @@ class DeviceAdministrationTimeDateConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -150,6 +152,7 @@ class DeviceAdministrationTimeDateConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py
new file mode 100644
index 000000000..4b4d92cbe
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py
@@ -0,0 +1,90 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("id")
+ name = self._task.args.get("name")
+ if not name and not id:
+ response = ise.exec(
+ family="edda",
+ function='get_edda_dictionary_references',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/endpoint.py b/ansible_collections/cisco/ise/plugins/action/endpoint.py
index b8526e704..5de00e6d8 100644
--- a/ansible_collections/cisco/ise/plugins/action/endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/action/endpoint.py
@@ -31,6 +31,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ name=dict(type="str"),
description=dict(type="str"),
mac=dict(type="str"),
profileId=dict(type="str"),
@@ -46,8 +47,8 @@ argument_spec.update(dict(
))
required_if = [
- ("state", "present", ["id", "mac"], True),
- ("state", "absent", ["id", "mac"], True),
+ ("state", "present", ["id", "name"], True),
+ ("state", "absent", ["id", "name"], True),
]
required_one_of = []
mutually_exclusive = []
@@ -58,6 +59,7 @@ class Endpoint(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ name=params.get("name"),
description=params.get("description"),
mac=params.get("mac"),
profile_id=params.get("profileId"),
@@ -123,10 +125,7 @@ class Endpoint(object):
result = False
prev_obj = None
id = self.new_object.get("id")
- name = self.new_object.get("mac")
- if name:
- name = re.sub("[-:.]", "", name).lower()
- self.new_object.update(dict(mac=name))
+ name = self.new_object.get("name")
if id:
prev_obj = self.get_object_by_id(id)
result = prev_obj is not None and isinstance(prev_obj, dict)
@@ -139,6 +138,7 @@ class Endpoint(object):
requested_obj = self.new_object
obj_params = [
+ ("name", "name"),
("description", "description"),
("mac", "mac"),
("profileId", "profile_id"),
@@ -168,7 +168,7 @@ class Endpoint(object):
def update(self):
id = self.new_object.get("id")
- name = self.new_object.get("mac")
+ name = self.new_object.get("name")
result = None
if not id:
id_ = self.get_object_by_name(name).get("id")
@@ -182,7 +182,7 @@ class Endpoint(object):
def delete(self):
id = self.new_object.get("id")
- name = self.new_object.get("mac")
+ name = self.new_object.get("name")
result = None
if not id:
id_ = self.get_object_by_name(name).get("id")
diff --git a/ansible_collections/cisco/ise/plugins/action/filter_policy.py b/ansible_collections/cisco/ise/plugins/action/filter_policy.py
index 3f4732053..d2a3ca73e 100644
--- a/ansible_collections/cisco/ise/plugins/action/filter_policy.py
+++ b/ansible_collections/cisco/ise/plugins/action/filter_policy.py
@@ -31,9 +31,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ise_compare_equality,
get_dict_result,
)
-from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
- InconsistentParameters,
-)
# Get common arguments specification
argument_spec = ise_argument_spec()
diff --git a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
index c4c748317..643df1b6d 100644
--- a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py
@@ -84,7 +84,7 @@ class ActionModule(ActionBase):
family="misc",
function='get_active_count',
params=self.get_object(self._task.args)
- ).response['count']
+ ).response['sessionCount']['count']
self._result.update(dict(ise_response=response))
self._result.update(ise.exit_json())
return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
index 63e8d4bce..b8663b844 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
@@ -33,6 +32,7 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
+ identitySourceId=dict(type="str"),
identitySourceName=dict(type="str"),
ifAuthFail=dict(type="str"),
ifProcessFail=dict(type="str"),
@@ -58,6 +58,7 @@ class NetworkAccessAuthenticationRules(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
+ identity_source_id=params.get("identitySourceId"),
identity_source_name=params.get("identitySourceName"),
if_auth_fail=params.get("ifAuthFail"),
if_process_fail=params.get("ifProcessFail"),
@@ -133,6 +134,7 @@ class NetworkAccessAuthenticationRules(object):
requested_obj = self.new_object
obj_params = [
+ ("identitySourceId", "identity_source_id"),
("identitySourceName", "identity_source_name"),
("ifAuthFail", "if_auth_fail"),
("ifProcessFail", "if_process_fail"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
index 889963294..2b6ae8c21 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py
@@ -21,9 +21,7 @@ from ansible.errors import AnsibleActionFail
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
- ise_compare_equality,
ise_compare_equality2,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
index a80689189..7ab7a5b7e 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py
@@ -37,6 +37,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -70,6 +71,7 @@ class NetworkAccessConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -152,6 +154,7 @@ class NetworkAccessConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
index b2d3e9bcd..b67519de4 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
index 462fd6081..c5b3c4d86 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py
@@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
ise_compare_equality,
- get_dict_result,
)
from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
InconsistentParameters,
diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
index 65957d072..23b46c263 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py
@@ -40,6 +40,7 @@ argument_spec.update(dict(
id=dict(type="str"),
name=dict(type="str"),
attributeName=dict(type="str"),
+ attributeId=dict(type="str"),
attributeValue=dict(type="str"),
dictionaryName=dict(type="str"),
dictionaryValue=dict(type="str"),
@@ -73,6 +74,7 @@ class NetworkAccessTimeDateConditions(object):
id=params.get("id"),
name=params.get("name"),
attribute_name=params.get("attributeName"),
+ attribute_id=params.get("attributeId"),
attribute_value=params.get("attributeValue"),
dictionary_name=params.get("dictionaryName"),
dictionary_value=params.get("dictionaryValue"),
@@ -150,6 +152,7 @@ class NetworkAccessTimeDateConditions(object):
("id", "id"),
("name", "name"),
("attributeName", "attribute_name"),
+ ("attributeId", "attribute_id"),
("attributeValue", "attribute_value"),
("dictionaryName", "dictionary_name"),
("dictionaryValue", "dictionary_value"),
diff --git a/ansible_collections/cisco/ise/plugins/action/network_device_group.py b/ansible_collections/cisco/ise/plugins/action/network_device_group.py
index 8cd682e9c..d45ef371a 100644
--- a/ansible_collections/cisco/ise/plugins/action/network_device_group.py
+++ b/ansible_collections/cisco/ise/plugins/action/network_device_group.py
@@ -32,7 +32,7 @@ argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
name=dict(type="str"),
description=dict(type="str"),
- othername=dict(type="str"),
+ ndgtype=dict(type="str"),
id=dict(type="str"),
))
@@ -51,7 +51,7 @@ class NetworkDeviceGroup(object):
self.new_object = dict(
name=params.get("name"),
description=params.get("description"),
- othername=params.get("othername"),
+ ndgtype=params.get("ndgtype"),
id=params.get("id"),
)
@@ -122,7 +122,7 @@ class NetworkDeviceGroup(object):
obj_params = [
("name", "name"),
("description", "description"),
- ("othername", "othername"),
+ ("ndgtype", "ndgtype"),
("id", "id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
diff --git a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
index af546b5ef..9d5364d4d 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py
@@ -37,7 +37,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
index 9cbd890b9..386e2aada 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py
@@ -37,7 +37,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
index 71f25d3d7..53a9a7920 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py
@@ -21,7 +21,6 @@ from ansible.errors import AnsibleActionFail
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ISESDK,
ise_argument_spec,
- ise_compare_equality,
ise_compare_equality2,
get_dict_result,
)
diff --git a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
index def196c60..2a6dcb0b2 100644
--- a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py
@@ -36,7 +36,7 @@ argument_spec.update(dict(
required_if = []
required_one_of = [
("hostname"),
-],
+]
mutually_exclusive = []
required_together = []
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
index e6e6668b7..7e4007d03 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
index a0a3e6d8a..8acba2dd2 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
index 9de4ae5ae..8e7a1c2b5 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
index 708551dd2..2a1b008f2 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py
@@ -18,8 +18,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
argument_spec = dict(
diff --git a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
index bca25ce3d..085271454 100644
--- a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
+++ b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py
@@ -10,8 +10,6 @@ except ImportError:
else:
ANSIBLE_UTILS_IS_INSTALLED = True
from ansible.errors import AnsibleActionFail
-from urllib.parse import quote
-import time
from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node
from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
ise_compare_equality,
@@ -97,7 +95,7 @@ class ActionModule(ActionBase):
try:
prev_obj = node.get_roles_services()
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if prev_obj:
if obj.requires_update(prev_obj, request_obj):
try:
diff --git a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
index 1e138018a..298223855 100644
--- a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
+++ b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py
@@ -33,6 +33,7 @@ argument_spec.update(dict(
name=dict(type="str"),
description=dict(type="str"),
ersRestIDStoreAttributes=dict(type="dict"),
+ ersRestIDStoreUserAttributes=dict(type="dict"),
id=dict(type="str"),
))
@@ -52,6 +53,7 @@ class RestIdStore(object):
name=params.get("name"),
description=params.get("description"),
ers_rest_idstore_attributes=params.get("ersRestIDStoreAttributes"),
+ ers_rest_idstore_user_attributes=params.get("ersRestIDStoreUserAttributes"),
id=params.get("id"),
)
@@ -120,6 +122,7 @@ class RestIdStore(object):
("name", "name"),
("description", "description"),
("ersRestIDStoreAttributes", "ers_rest_idstore_attributes"),
+ ("ersRestIDStoreUserAttributes", "ers_rest_idstore_user_attributes"),
("id", "id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
@@ -129,6 +132,7 @@ class RestIdStore(object):
for (ise_param, ansible_param) in obj_params)
def create(self):
+ print(self.new_object)
result = self.ise.exec(
family="restid_store",
function="create_rest_id_store",
@@ -221,6 +225,7 @@ class ActionModule(ActionBase):
self._result.update(dict(ise_update_response=ise_update_response))
(obj_exists, updated_obj) = obj.exists()
response = updated_obj
+ ise.object_updated()
has_changed = None
has_changed = ise_update_response.get("UpdatedFieldsList").get("updatedField")
if (len(has_changed) == 0 or
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/action/subscriber.py
index ff1dd8fd7..a3713078a 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -33,42 +33,46 @@ argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
state=dict(type="str", default="present", choices=["present", "absent"]),
- additionalAttributes=dict(type="str"),
- id=dict(type="str"),
- lastUpdate=dict(type="str"),
- name=dict(type="str"),
+ enabled=dict(type="bool"),
+ friendlyName=dict(type="str"),
+ identityGroups=dict(type="str"),
+ imeis=dict(type="str"),
+ imsi=dict(type="str"),
+ ki=dict(type="str"),
+ opc=dict(type="str"),
+ subscriberId=dict(type="str"),
))
-required_if = [
- ("state", "present", ["id", "name"], True),
- ("state", "absent", ["id", "name"], True),
-]
+required_if = []
required_one_of = []
mutually_exclusive = []
required_together = []
-class TrustsecVn(object):
+class Subscriber(object):
def __init__(self, params, ise):
self.ise = ise
self.new_object = dict(
- additional_attributes=params.get("additionalAttributes"),
- id=params.get("id"),
- last_update=params.get("lastUpdate"),
- name=params.get("name"),
+ enabled=params.get("enabled"),
+ friendly_name=params.get("friendlyName"),
+ identity_groups=params.get("identityGroups"),
+ imeis=params.get("imeis"),
+ imsi=params.get("imsi"),
+ ki=params.get("ki"),
+ opc=params.get("opc"),
+ subscriber_id=params.get("subscriberId"),
)
def get_object_by_name(self, name):
# NOTICE: Get does not support/work for filter by name with EQ
result = None
gen_items_responses = self.ise.exec(
- family="virtual_network",
- function="get_virtual_networks_generator",
- params={"filter": "name.EQ.{name}".format(name=name)}
+ family="subscriber",
+ function="get_all_subscribers_generator"
)
try:
for items_response in gen_items_responses:
- items = items_response.response['response']
+ items = items_response.response.get('response', [])
result = get_dict_result(items, 'name', name)
if result:
return result
@@ -90,10 +94,10 @@ class TrustsecVn(object):
def get_object_by_id(self, id):
try:
result = self.ise.exec(
- family="virtual_network",
- function="get_virtual_network_by_id",
+ family="subscriber",
+ function="get_subscriber_by_id",
handle_func_exception=False,
- params={"id": id}
+ params={"subscriber_id": id}
).response['response']
except (TypeError, AttributeError) as e:
self.ise.fail_json(
@@ -107,15 +111,13 @@ class TrustsecVn(object):
)
except Exception:
result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
return result
def exists(self):
id_exists = False
name_exists = False
prev_obj = None
- o_id = self.new_object.get("id")
+ o_id = self.new_object.get("subscriberId")
name = self.new_object.get("name")
if o_id:
prev_obj = self.get_object_by_id(o_id)
@@ -136,10 +138,14 @@ class TrustsecVn(object):
requested_obj = self.new_object
obj_params = [
- ("additionalAttributes", "additional_attributes"),
- ("id", "id"),
- ("lastUpdate", "last_update"),
- ("name", "name"),
+ ("enabled", "enabled"),
+ ("friendlyName", "friendly_name"),
+ ("identityGroups", "identity_groups"),
+ ("imeis", "imeis"),
+ ("imsi", "imsi"),
+ ("ki", "ki"),
+ ("opc", "opc"),
+ ("subscriberId", "subscriber_id"),
]
# Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
# If any does not have eq params, it requires update
@@ -149,8 +155,8 @@ class TrustsecVn(object):
def create(self):
result = self.ise.exec(
- family="virtual_network",
- function="create_virtual_network",
+ family="subscriber",
+ function="create_subscriber",
params=self.new_object,
).response
return result
@@ -163,8 +169,8 @@ class TrustsecVn(object):
id_ = self.get_object_by_name(name).get("id")
self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="virtual_network",
- function="update_virtual_network_by_id",
+ family="subscriber",
+ function="update_subscriber",
params=self.new_object
).response
return result
@@ -177,8 +183,8 @@ class TrustsecVn(object):
id_ = self.get_object_by_name(name).get("id")
self.new_object.update(dict(id=id_))
result = self.ise.exec(
- family="virtual_network",
- function="delete_virtual_network_by_id",
+ family="subscriber",
+ function="delete_subscriber",
params=self.new_object
).response
return result
@@ -218,7 +224,7 @@ class ActionModule(ActionBase):
self._check_argspec()
ise = ISESDK(params=self._task.args)
- obj = TrustsecVn(self._task.args, ise)
+ obj = Subscriber(self._task.args, ise)
state = self._task.args.get("state")
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py
index 349b4bc85..bd392306d 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -27,7 +27,8 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
argument_spec = ise_argument_spec()
# Add arguments specific for this module
argument_spec.update(dict(
- payload=dict(type="list"),
+ ItemList=dict(type="list"),
+ operation=dict(type="str"),
))
required_if = []
@@ -65,7 +66,8 @@ class ActionModule(ActionBase):
def get_object(self, params):
new_object = dict(
- payload=params.get("payload"),
+ item_list=params.get("ItemList"),
+ operation=params.get("operation"),
)
return new_object
@@ -78,8 +80,8 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
response = ise.exec(
- family="sg_vn_mapping",
- function="bulk_create_sg_vn_mappings",
+ family="subscriber",
+ function="bulk_subscriber_operation",
params=self.get_object(self._task.args),
).response
diff --git a/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py
new file mode 100644
index 000000000..f82cd0d6d
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py
@@ -0,0 +1,98 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ imsi=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = True
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ imsi=params.get("imsi"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ self._result.update(dict(ise_response={}))
+
+ ise = ISESDK(params=self._task.args)
+
+ id = self._task.args.get("imsi")
+ name = self._task.args.get("name")
+ if id:
+ response = ise.exec(
+ family="subscriber",
+ function='get_subscriber_by_i_m_s_i',
+ params=self.get_object(self._task.args)
+ ).response['response']
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
+ if not name and not id:
+ # NOTICE: Does not have a get all method or it is in another action
+ response = None
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py
index 42820bc30..65d8cc69c 100644
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py
@@ -1,7 +1,7 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
-# Copyright (c) 2021, Cisco Systems
+# Copyright (c) 2023, Cisco Systems
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
@@ -29,11 +29,11 @@ argument_spec = ise_argument_spec()
argument_spec.update(dict(
page=dict(type="int"),
size=dict(type="int"),
+ filter=dict(type="str"),
+ filterType=dict(type="str"),
sort=dict(type="str"),
sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
+ subscriberId=dict(type="str"),
))
required_if = []
@@ -73,11 +73,11 @@ class ActionModule(ActionBase):
new_object = dict(
page=params.get("page"),
size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
filter=params.get("filter"),
filter_type=params.get("filterType"),
- id=params.get("id"),
+ sort=params.get("sort"),
+ sort_by=params.get("sortBy"),
+ subscriber_id=params.get("subscriberId"),
)
return new_object
@@ -91,12 +91,12 @@ class ActionModule(ActionBase):
ise = ISESDK(params=self._task.args)
- id = self._task.args.get("id")
+ id = self._task.args.get("subscriberId")
name = self._task.args.get("name")
if id:
response = ise.exec(
- family="sg_vn_mapping",
- function='get_sg_vn_mapping_by_id',
+ family="subscriber",
+ function='get_subscriber_by_id',
params=self.get_object(self._task.args)
).response['response']
self._result.update(dict(ise_response=response))
@@ -105,8 +105,8 @@ class ActionModule(ActionBase):
if not name and not id:
responses = []
generator = ise.exec(
- family="sg_vn_mapping",
- function='get_sg_vn_mappings_generator',
+ family="subscriber",
+ function='get_all_subscribers_generator',
params=self.get_object(self._task.args),
)
try:
diff --git a/ansible_collections/cisco/ise/plugins/action/system_certificate.py b/ansible_collections/cisco/ise/plugins/action/system_certificate.py
index 0ca926288..3faae7fec 100644
--- a/ansible_collections/cisco/ise/plugins/action/system_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/action/system_certificate.py
@@ -121,7 +121,7 @@ class SystemCertificate(object):
function="get_system_certificate_by_id",
params={"id": id, "host_name": host_name},
handle_func_exception=False,
- ).response
+ ).response['response']
except Exception as e:
result = None
return result
@@ -143,6 +143,18 @@ class SystemCertificate(object):
def requires_update(self, current_obj):
requested_obj = self.new_object
+ used_by_value = current_obj.get("usedBy")
+ if used_by_value is None or used_by_value.lower() == "not in use":
+ current_obj["eap"] = False
+ current_obj["pxgrid"] = False
+ current_obj["radius"] = False
+ current_obj["ims"] = False
+ else:
+ current_obj["eap"] = "eap" in used_by_value.lower()
+ current_obj["pxgrid"] = "pxgrid" in used_by_value.lower()
+ current_obj["radius"] = "radius" in used_by_value.lower()
+ current_obj["ims"] = "ims" in used_by_value.lower()
+
obj_params = [
("admin", "admin"),
("allowPortalTagTransferForSameSubject", "allow_portal_tag_transfer_for_same_subject"),
@@ -153,7 +165,7 @@ class SystemCertificate(object):
("expirationTTLPeriod", "expiration_ttl_period"),
("expirationTTLUnits", "expiration_ttl_units"),
("ims", "ims"),
- ("name", "name"),
+ ("friendlyName", "name"),
("portal", "portal"),
("portalGroupTag", "portal_group_tag"),
("pxgrid", "pxgrid"),
diff --git a/ansible_collections/cisco/ise/plugins/action/test_connector.py b/ansible_collections/cisco/ise/plugins/action/test_connector.py
new file mode 100644
index 000000000..f3a1b5797
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/action/test_connector.py
@@ -0,0 +1,98 @@
+#!/usr/bin/env python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2023, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+from __future__ import absolute_import, division, print_function
+
+__metaclass__ = type
+from ansible.plugins.action import ActionBase
+
+try:
+ from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
+ AnsibleArgSpecValidator,
+ )
+except ImportError:
+ ANSIBLE_UTILS_IS_INSTALLED = False
+else:
+ ANSIBLE_UTILS_IS_INSTALLED = True
+from ansible.errors import AnsibleActionFail
+from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
+ ISESDK,
+ ise_argument_spec,
+)
+
+# Get common arguements specification
+argument_spec = ise_argument_spec()
+# Add arguments specific for this module
+argument_spec.update(dict(
+ authType=dict(type="str"),
+ authValues=dict(type="dict"),
+ connectorName=dict(type="str"),
+ responseParsing=dict(type="str"),
+ uniqueID=dict(type="str"),
+ url=dict(type="str"),
+))
+
+required_if = []
+required_one_of = []
+mutually_exclusive = []
+required_together = []
+
+
+class ActionModule(ActionBase):
+ def __init__(self, *args, **kwargs):
+ if not ANSIBLE_UTILS_IS_INSTALLED:
+ raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
+ super(ActionModule, self).__init__(*args, **kwargs)
+ self._supports_async = False
+ self._supports_check_mode = False
+ self._result = None
+
+ # Checks the supplied parameters against the argument spec for this module
+ def _check_argspec(self):
+ aav = AnsibleArgSpecValidator(
+ data=self._task.args,
+ schema=dict(argument_spec=argument_spec),
+ schema_format="argspec",
+ schema_conditionals=dict(
+ required_if=required_if,
+ required_one_of=required_one_of,
+ mutually_exclusive=mutually_exclusive,
+ required_together=required_together,
+ ),
+ name=self._task.action,
+ )
+ valid, errors, self._task.args = aav.validate()
+ if not valid:
+ raise AnsibleActionFail(errors)
+
+ def get_object(self, params):
+ new_object = dict(
+ auth_type=params.get("authType"),
+ auth_values=params.get("authValues"),
+ connector_name=params.get("connectorName"),
+ response_parsing=params.get("responseParsing"),
+ unique_id=params.get("uniqueID"),
+ url=params.get("url"),
+ )
+ return new_object
+
+ def run(self, tmp=None, task_vars=None):
+ self._task.diff = False
+ self._result = super(ActionModule, self).run(tmp, task_vars)
+ self._result["changed"] = False
+ self._check_argspec()
+
+ ise = ISESDK(params=self._task.args)
+
+ response = ise.exec(
+ family="edda",
+ function="test_connector",
+ params=self.get_object(self._task.args),
+ ).response
+
+ self._result.update(dict(ise_response=response))
+ self._result.update(ise.exit_json())
+ return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py
deleted file mode 100644
index e0390f20e..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="nbar_app",
- function='get_nbar_app_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="nbar_app",
- function='get_nbar_apps_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py
deleted file mode 100644
index f522e9296..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py
+++ /dev/null
@@ -1,267 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
- ise_compare_equality,
- get_dict_result,
-)
-from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import (
- InconsistentParameters,
-)
-
-# Get common arguments specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- state=dict(type="str", default="present", choices=["present", "absent"]),
- id=dict(type="str"),
- lastUpdate=dict(type="str"),
- sgName=dict(type="str"),
- sgtId=dict(type="str"),
- vnId=dict(type="str"),
- vnName=dict(type="str"),
-))
-
-required_if = [
- ("state", "present", ["id", "sgName", "vnName"], True),
- ("state", "absent", ["id", "sgName", "vnName"], True),
-]
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class TrustsecSgVnMapping(object):
- def __init__(self, params, ise):
- self.ise = ise
- self.new_object = dict(
- id=params.get("id"),
- last_update=params.get("lastUpdate"),
- sg_name=params.get("sgName"),
- sgt_id=params.get("sgtId"),
- vn_id=params.get("vnId"),
- vn_name=params.get("vnName"),
- )
-
- def get_object_by_name(self, sg_name, vn_name):
- # NOTICE: Get does not support/work for filter by name with EQ
- result = None
- gen_items_responses = self.ise.exec(
- family="sg_vn_mapping",
- function="get_sg_vn_mappings_generator"
- )
- try:
- for items_response in gen_items_responses:
- items = items_response.response['response']
- for item in items:
- if isinstance(item, dict) and item.get('sgName') == sg_name and item.get('vnName') == vn_name:
- result = item
- break
- if result:
- return result
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- return result
- return result
-
- def get_object_by_id(self, id):
- try:
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="get_sg_vn_mapping_by_id",
- handle_func_exception=False,
- params={"id": id}
- ).response['response']
- except (TypeError, AttributeError) as e:
- self.ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception:
- result = None
- if isinstance(result, list) and len(result) > 0:
- return result[0]
- return result
-
- def exists(self):
- id_exists = False
- name_exists = False
- prev_obj = None
- o_id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- if o_id:
- prev_obj = self.get_object_by_id(o_id)
- id_exists = prev_obj is not None and isinstance(prev_obj, dict)
- if not id_exists and sg_name and vn_name:
- prev_obj = self.get_object_by_name(sg_name, vn_name)
- name_exists = prev_obj is not None and isinstance(prev_obj, dict)
- if name_exists:
- _id = prev_obj.get("id")
- if id_exists and name_exists and o_id != _id:
- raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object")
- if _id:
- prev_obj = self.get_object_by_id(_id)
- it_exists = prev_obj is not None and isinstance(prev_obj, dict)
- return (it_exists, prev_obj)
-
- def requires_update(self, current_obj):
- requested_obj = self.new_object
-
- obj_params = [
- ("id", "id"),
- ("lastUpdate", "last_update"),
- ("sgName", "sg_name"),
- ("sgtId", "sgt_id"),
- ("vnId", "vn_id"),
- ("vnName", "vn_name"),
- ]
- # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params
- # If any does not have eq params, it requires update
- return any(not ise_compare_equality(current_obj.get(ise_param),
- requested_obj.get(ansible_param))
- for (ise_param, ansible_param) in obj_params)
-
- def create(self):
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="create_sg_vn_mapping",
- params=self.new_object,
- ).response
- return result
-
- def update(self):
- id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- result = None
- if not id:
- id_ = self.get_object_by_name(sg_name, vn_name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="update_sg_vn_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
- def delete(self):
- id = self.new_object.get("id")
- sg_name = self.new_object.get("sg_name")
- vn_name = self.new_object.get("vn_name")
- result = None
- if not id:
- id_ = self.get_object_by_name(sg_name, vn_name).get("id")
- self.new_object.update(dict(id=id_))
- result = self.ise.exec(
- family="sg_vn_mapping",
- function="delete_sg_vn_mapping_by_id",
- params=self.new_object
- ).response
- return result
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
- obj = TrustsecSgVnMapping(self._task.args, ise)
-
- state = self._task.args.get("state")
-
- response = None
-
- if state == "present":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- if obj.requires_update(prev_obj):
- ise_update_response = obj.update()
- self._result.update(dict(ise_update_response=ise_update_response))
- (obj_exists, updated_obj) = obj.exists()
- response = updated_obj
- ise.object_updated()
- else:
- response = prev_obj
- ise.object_already_present()
- else:
- ise_create_response = obj.create()
- (obj_exists, created_obj) = obj.exists()
- response = created_obj
- ise.object_created()
-
- elif state == "absent":
- (obj_exists, prev_obj) = obj.exists()
- if obj_exists:
- obj.delete()
- response = prev_obj
- ise.object_deleted()
- else:
- ise.object_already_absent()
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py
deleted file mode 100644
index d6aed5405..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="virtual_network",
- function="bulk_delete_virtual_networks",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py
deleted file mode 100644
index 4b37b3318..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="virtual_network",
- function="bulk_update_virtual_networks",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py
deleted file mode 100644
index 0029067ea..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="virtual_network",
- function='get_virtual_network_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="virtual_network",
- function='get_virtual_networks_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py
deleted file mode 100644
index 361916f3a..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_create_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py
deleted file mode 100644
index 6cb9d9353..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_delete_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py
deleted file mode 100644
index fa6f11edd..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py
+++ /dev/null
@@ -1,88 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- payload=dict(type="list"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = False
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- payload=params.get("payload"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- ise = ISESDK(params=self._task.args)
-
- response = ise.exec(
- family="vn_vlan_mapping",
- function="bulk_update_vn_vlan_mappings",
- params=self.get_object(self._task.args),
- ).response
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py
deleted file mode 100644
index f99235f74..000000000
--- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py
+++ /dev/null
@@ -1,141 +0,0 @@
-#!/usr/bin/env python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-from __future__ import absolute_import, division, print_function
-
-__metaclass__ = type
-from ansible.plugins.action import ActionBase
-
-try:
- from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import (
- AnsibleArgSpecValidator,
- )
-except ImportError:
- ANSIBLE_UTILS_IS_INSTALLED = False
-else:
- ANSIBLE_UTILS_IS_INSTALLED = True
-from ansible.errors import AnsibleActionFail
-from ansible_collections.cisco.ise.plugins.plugin_utils.ise import (
- ISESDK,
- ise_argument_spec,
-)
-
-# Get common arguements specification
-argument_spec = ise_argument_spec()
-# Add arguments specific for this module
-argument_spec.update(dict(
- page=dict(type="int"),
- size=dict(type="int"),
- sort=dict(type="str"),
- sortBy=dict(type="str"),
- filter=dict(type="list"),
- filterType=dict(type="str"),
- id=dict(type="str"),
-))
-
-required_if = []
-required_one_of = []
-mutually_exclusive = []
-required_together = []
-
-
-class ActionModule(ActionBase):
- def __init__(self, *args, **kwargs):
- if not ANSIBLE_UTILS_IS_INSTALLED:
- raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'")
- super(ActionModule, self).__init__(*args, **kwargs)
- self._supports_async = False
- self._supports_check_mode = True
- self._result = None
-
- # Checks the supplied parameters against the argument spec for this module
- def _check_argspec(self):
- aav = AnsibleArgSpecValidator(
- data=self._task.args,
- schema=dict(argument_spec=argument_spec),
- schema_format="argspec",
- schema_conditionals=dict(
- required_if=required_if,
- required_one_of=required_one_of,
- mutually_exclusive=mutually_exclusive,
- required_together=required_together,
- ),
- name=self._task.action,
- )
- valid, errors, self._task.args = aav.validate()
- if not valid:
- raise AnsibleActionFail(errors)
-
- def get_object(self, params):
- new_object = dict(
- page=params.get("page"),
- size=params.get("size"),
- sort=params.get("sort"),
- sort_by=params.get("sortBy"),
- filter=params.get("filter"),
- filter_type=params.get("filterType"),
- id=params.get("id"),
- )
- return new_object
-
- def run(self, tmp=None, task_vars=None):
- self._task.diff = False
- self._result = super(ActionModule, self).run(tmp, task_vars)
- self._result["changed"] = False
- self._check_argspec()
-
- self._result.update(dict(ise_response=[]))
-
- ise = ISESDK(params=self._task.args)
-
- id = self._task.args.get("id")
- name = self._task.args.get("name")
- if id:
- response = ise.exec(
- family="vn_vlan_mapping",
- function='get_vn_vlan_mapping_by_id',
- params=self.get_object(self._task.args)
- ).response['response']
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
- if not name and not id:
- responses = []
- generator = ise.exec(
- family="vn_vlan_mapping",
- function='get_vn_vlan_mappings_generator',
- params=self.get_object(self._task.args),
- )
- try:
- for item in generator:
- tmp_response = item.response['response']
- if isinstance(tmp_response, list):
- responses += tmp_response
- else:
- responses.append(tmp_response)
- response = responses
- except (TypeError, AttributeError) as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " Check the configuration of your API Settings and API Gateway settings on your ISE server."
- " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled."
- " You may want to enable the (ise_debug: True) argument."
- " The error was: {error}"
- ).format(error=e)
- )
- except Exception as e:
- ise.fail_json(
- msg=(
- "An error occured when executing operation."
- " The error was: {error}"
- " You may want to enable the (ise_debug: True) argument."
- ).format(error=e)
- )
-
- self._result.update(dict(ise_response=response))
- self._result.update(ise.exit_json())
- return self._result
diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
index dfb7ad90a..c115588b3 100644
--- a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
+++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py
@@ -65,6 +65,12 @@ options:
type: bool
default: false
version_added: '3.0.0'
+ ise_single_request_timeout:
+ description:
+ - Timeout (in seconds) for RESTful HTTP requests.
+ type: int
+ default: 60
+ version_added: '3.0.0'
notes:
- "Does not support C(check_mode)"
- "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK"
diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
index 57e385ca6..baae22540 100644
--- a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
+++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py
@@ -65,6 +65,12 @@ options:
type: bool
default: false
version_added: '3.0.0'
+ ise_single_request_timeout:
+ description:
+ - Timeout (in seconds) for RESTful HTTP requests.
+ type: int
+ default: 60
+ version_added: '3.0.0'
notes:
- "Supports C(check_mode)"
- "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK"
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
index d08c9ebfb..b8d1afa37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py
@@ -43,7 +43,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
index 3c6e5f13b..b338f5888 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py
@@ -87,7 +87,7 @@ options:
description: ACI Settings's untaggedPacketIepgName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
index 5884b4728..61bad7bbe 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
index 5608cde0c..61d13bf89 100644
--- a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
+++ b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory.py b/ansible_collections/cisco/ise/plugins/modules/active_directory.py
index 5fa9d41bf..0cc8e53ec 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory.py
@@ -191,7 +191,7 @@ options:
alphanumeric and .-_/\\ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
index 298a05eb7..729454376 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py
@@ -190,7 +190,7 @@ options:
alphanumeric and .-_/\\ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
index 46dd9467c..f0925183c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -74,7 +74,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
index 5291dfc12..d8e4db519 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
index 2584e6f50..5fbe56eb9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -70,7 +70,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
index b07f435ce..6782bb235 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
index bc2e30553..6dc4da875 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
index 26d847184..4f1e46c87 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
index 787103629..7359c6151 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
index 748478d72..6974288ac 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py
@@ -21,7 +21,7 @@ options:
- Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
index 78692e0fc..2df9027f7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py
@@ -32,7 +32,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -67,7 +67,7 @@ ise_response:
{
"groups": [
{
- "groupName": "string",
+ "name": "string",
"sid": "string",
"type": "string"
}
diff --git a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
index 23c7bc99b..cf793e354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
index 6a9d3868e..88fa594b4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
+++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py
@@ -310,7 +310,7 @@ options:
type: bool
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
index 69241303d..84b86e5e9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
index ebb530e2e..f1fde8079 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
index 64b14136c..2615a8aff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
index f2d1971d1..3e9037107 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: ANC Endpoint Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
index 371f16a2b..1117dafa2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
index 8a198d96c..5a58c8f22 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
index 67ae179e9..a49bc949f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py
@@ -33,7 +33,7 @@ options:
description: ANC Policy's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
index 1a3f9c081..285529a89 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
index 0161c722a..ea2e59efc 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: ANC Policy Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
index 904267a31..21051ffdf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
index b00dd4aa1..75587110f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py
@@ -174,7 +174,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
index c4b89790a..2b0f7bfcb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
index 421c086d1..11176958d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_config.py
index ce5a43eb3..ef5a51df3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_config.py
@@ -31,7 +31,7 @@ options:
get copied.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
index 9b176d705..7d22a9314 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
index 1480f8d65..908059a00 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py
@@ -30,7 +30,7 @@ options:
true, false.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
index 74ab9ab7b..e994d04d2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py
@@ -57,7 +57,7 @@ options:
description: Backup Schedule Config's weekDay.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
index 9babddc26..a8ce5bb2a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
+++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py
@@ -57,7 +57,7 @@ options:
description: Backup Schedule Config Update's weekDay.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Backup And Restore
diff --git a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
index 74576e8c5..1dcccb2b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py
@@ -68,7 +68,7 @@ options:
description: Validate Certificate Extensions.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
index c3b77fada..b6073d0f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py
@@ -259,7 +259,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
index ed187dfab..530eae753 100644
--- a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
index dcddcd19b..da2bb18b7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py
@@ -51,7 +51,7 @@ options:
- an option only in AD).
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
index d996fb146..ff5eac756 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
index 4d6d0d183..580e85c1a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration.py b/ansible_collections/cisco/ise/plugins/modules/configuration.py
new file mode 100644
index 000000000..1c551c299
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/configuration.py
@@ -0,0 +1,71 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: configuration
+short_description: Resource module for Configuration
+description:
+- Manage operation update of the resource Configuration.
+- API to enable/disable LSD settings.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ enableEPO:
+ description: To enable/disable LSD ownership settings.
+ type: bool
+ enableRCM:
+ description: To enable/disable random mac(RCM) settings. Please note that this flag
+ will be set to false if enableEPO flag is false.
+ type: bool
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ configuration.Configuration.update_configuration,
+
+ - Paths used are
+ put /api/v1/lsd/updateLsdSettings,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.configuration:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enableEPO: true
+ enableRCM: true
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration_info.py b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py
new file mode 100644
index 000000000..6a942dedf
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py
@@ -0,0 +1,51 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: configuration_info
+short_description: Information module for Configuration
+description:
+- Get all Configuration.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ configuration.Configuration.get_configuration,
+
+ - Paths used are
+ get /api/v1/lsd/updateLsdSettings,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Configuration
+ cisco.ise.configuration_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "enableEPO": true,
+ "enableRCM": true
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config.py b/ansible_collections/cisco/ise/plugins/modules/connector_config.py
new file mode 100644
index 000000000..b374012b1
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/connector_config.py
@@ -0,0 +1,305 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: connector_config
+short_description: Resource module for Connector Config
+description:
+- Manage operations create, update and delete of the resource Connector Config.
+- EDDA - Configure connectorconfig information.
+- EDDA - Delete Configure connectorConfig information based on ConnectorName.
+- EDDA - update Configure connectorConfig information based on ConnectorName.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ additionalProperties:
+ description: Connector Config's additionalProperties.
+ type: dict
+ attributes:
+ description: ConnectorName.
+ suboptions:
+ attributeMapping:
+ description: <p>List of feature names</p>.
+ elements: dict
+ suboptions:
+ dictionaryAttribute:
+ description: Connector Config's dictionaryAttribute.
+ type: str
+ includeInDictionary:
+ description: IncludeInDictionary flag.
+ type: bool
+ jsonAttribute:
+ description: Connector Config's jsonAttribute.
+ type: str
+ type: list
+ bulkUniqueIdentifier:
+ description: Uniqueness to identify.
+ type: str
+ topLevelObject:
+ description: Root level of json.
+ type: str
+ uniqueIdentifier:
+ description: Uniqueness to identify.
+ type: str
+ versionIdentifier:
+ description: Version uniqueness to identify.
+ type: str
+ type: dict
+ connectorName:
+ description: ConnectorName.
+ type: str
+ connectorType:
+ description: Connector Type list.
+ type: str
+ deltasyncSchedule:
+ description: Connector Config's deltasyncSchedule.
+ suboptions:
+ interval:
+ description: Run at interval (hours).
+ type: int
+ intervalUnit:
+ description: Interval Units.
+ type: str
+ startDate:
+ description: Start date and Time.
+ type: str
+ type: dict
+ description:
+ description: Description.
+ type: str
+ enabled:
+ description: Enabled flag.
+ type: bool
+ fullsyncSchedule:
+ description: Connector Config's fullsyncSchedule.
+ suboptions:
+ interval:
+ description: Run at interval (hours).
+ type: int
+ intervalUnit:
+ description: Interval Units.
+ type: str
+ startDate:
+ description: Start date and Time.
+ type: str
+ type: dict
+ protocol:
+ description: Protocol.
+ type: str
+ skipCertificateValidations:
+ description: SkipCertificateValidations flag.
+ type: bool
+ url:
+ description: Connector Config's url.
+ suboptions:
+ accessKey:
+ description: Accesskey.
+ type: str
+ authenticationType:
+ description: Authentication Type list.
+ type: str
+ bulkUrl:
+ description: BulkUrl.
+ type: str
+ clientId:
+ description: Clientid.
+ type: str
+ clientSecret:
+ description: Clientsecret.
+ type: str
+ incrementalUrl:
+ description: IncrementalUrl.
+ type: str
+ password:
+ description: Password.
+ type: str
+ refreshToken:
+ description: Refreshtoken.
+ type: str
+ tokenHeader:
+ description: TokenHeader.
+ type: str
+ userName:
+ description: UserName.
+ type: str
+ type: dict
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.create_connector_config,
+ edda.Edda.delete_connector_config_by_connector_name,
+ edda.Edda.update_connector_config_by_connector_name,
+
+ - Paths used are
+ post /api/v1/edda/connector-config,
+ delete /api/v1/edda/connector-config/{connectorName},
+ put /api/v1/edda/connector-config/{connectorName},
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ additionalProperties: {}
+ attributes:
+ attributeMapping:
+ - dictionaryAttribute: string
+ includeInDictionary: true
+ jsonAttribute: string
+ bulkUniqueIdentifier: string
+ topLevelObject: string
+ uniqueIdentifier: string
+ versionIdentifier: string
+ connectorName: string
+ connectorType: string
+ deltasyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ description: string
+ enabled: true
+ fullsyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ protocol: string
+ skipCertificateValidations: true
+ url:
+ accessKey: string
+ authenticationType: string
+ bulkUrl: string
+ clientId: string
+ clientSecret: string
+ incrementalUrl: string
+ password: string
+ refreshToken: string
+ tokenHeader: string
+ userName: string
+
+- name: Update by name
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ additionalProperties: {}
+ attributes:
+ attributeMapping:
+ - dictionaryAttribute: string
+ includeInDictionary: true
+ jsonAttribute: string
+ bulkUniqueIdentifier: string
+ topLevelObject: string
+ uniqueIdentifier: string
+ versionIdentifier: string
+ connectorName: string
+ connectorType: string
+ deltasyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ description: string
+ enabled: true
+ fullsyncSchedule:
+ interval: 0
+ intervalUnit: string
+ startDate: string
+ protocol: string
+ skipCertificateValidations: true
+ url:
+ accessKey: string
+ authenticationType: string
+ bulkUrl: string
+ clientId: string
+ clientSecret: string
+ incrementalUrl: string
+ password: string
+ refreshToken: string
+ tokenHeader: string
+ userName: string
+
+- name: Delete by name
+ cisco.ise.connector_config:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: absent
+ connectorName: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connector": {
+ "additionalProperties": {},
+ "attributes": {
+ "attributeMapping": [
+ {
+ "dictionaryAttribute": "string",
+ "includeInDictionary": true,
+ "jsonAttribute": "string"
+ }
+ ],
+ "bulkUniqueIdentifier": "string",
+ "topLevelObject": "string",
+ "uniqueIdentifier": "string",
+ "versionIdentifier": "string"
+ },
+ "connectorName": "string",
+ "connectorType": "string",
+ "deltasyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "description": "string",
+ "enabled": true,
+ "fullsyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "protocol": "string",
+ "skipCertificateValidations": true,
+ "url": {
+ "accessKey": "string",
+ "authenticationType": "string",
+ "bulkUrl": "string",
+ "clientId": "string",
+ "clientSecret": "string",
+ "incrementalUrl": "string",
+ "password": "string",
+ "refreshToken": "string",
+ "tokenHeader": "string",
+ "userName": "string"
+ }
+ }
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: str
+ sample: >
+ "'string'"
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py
new file mode 100644
index 000000000..698dd2fd7
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py
@@ -0,0 +1,111 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: connector_config_info
+short_description: Information module for Connector Config
+description:
+- Get all Connector Config.
+- Get Connector Config by name.
+- EDDA - Get ALL connectorConfig information.
+- EDDA - Get connectorConfig information based on ConnectorName.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options:
+ connectorName:
+ description:
+ - ConnectorName path parameter. Update or delete or retrieve the connector config.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.get_connector_config,
+ edda.Edda.get_connector_config_by_connector_name,
+
+ - Paths used are
+ get /api/v1/edda/connector-config,
+ get /api/v1/edda/connector-config/{connectorName},
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Connector Config
+ cisco.ise.connector_config_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+- name: Get Connector Config by name
+ cisco.ise.connector_config_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ connectorName: string
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connector": {
+ "additionalProperties": {},
+ "attributes": {
+ "attributeMapping": [
+ {
+ "dictionaryAttribute": "string",
+ "includeInDictionary": true,
+ "jsonAttribute": "string"
+ }
+ ],
+ "bulkUniqueIdentifier": "string",
+ "topLevelObject": "string",
+ "uniqueIdentifier": "string",
+ "versionIdentifier": "string"
+ },
+ "connectorName": "string",
+ "connectorType": "string",
+ "deltasyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "description": "string",
+ "enabled": true,
+ "fullsyncSchedule": {
+ "interval": 0,
+ "intervalUnit": "string",
+ "startDate": "string"
+ },
+ "protocol": "string",
+ "skipCertificateValidations": true,
+ "url": {
+ "accessKey": "string",
+ "authenticationType": "string",
+ "bulkUrl": "string",
+ "clientId": "string",
+ "clientSecret": "string",
+ "incrementalUrl": "string",
+ "password": "string",
+ "refreshToken": "string",
+ "tokenHeader": "string",
+ "userName": "string"
+ }
+ }
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
index 13d1f134d..0fc26c12b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py
@@ -10,7 +10,7 @@ module: csr_delete
short_description: Resource module for CSR Delete
description:
- Manage operation delete of the resource CSR Delete.
-- This API deletes a Certificate Signing Request of a particular node based on given HostName and ID.
+- This API deletes the certificate signing request of a particular node based on a given hostname and ID.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module
@@ -24,7 +24,7 @@ options:
description: Id path parameter. ID of the Certificate Signing Request to be deleted.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
index a1f8b85e1..4cadca891 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py
@@ -37,7 +37,7 @@ options:
- The filename used to save the download file.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
index 3116b3802..3d769adc0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py
@@ -76,7 +76,7 @@ options:
description: CSR Generate's usedFor.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
index f7eaaf20d..b8727a777 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py
@@ -10,14 +10,14 @@ module: csr_generate_intermediate_ca
short_description: Resource module for CSR Generate Intermediate CA
description:
- Manage operation create of the resource CSR Generate Intermediate CA.
-- CSR Generation for Intermediate Certificates.
+- CSR generation for Intermediate Certificates.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_info.py
index 6dee74b16..3ccee98ed 100644
--- a/ansible_collections/cisco/ise/plugins/modules/csr_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/csr_info.py
@@ -69,7 +69,7 @@ options:
- Id path parameter. ID of the Certificate Signing Request returned.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py
new file mode 100644
index 000000000..3c213e44c
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py
@@ -0,0 +1,54 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_info
+short_description: Information module for Dataconnect Info
+description:
+- Get all Dataconnect Info.
+- This API retrieves the Dataconnect ODBC details.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.get_odbc_detail,
+
+ - Paths used are
+ get /api/v1/mnt/data-connect/details,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dataconnect Info
+ cisco.ise.dataconnect_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "hostname": "string",
+ "port": 0,
+ "servicename": "string",
+ "username": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py
new file mode 100644
index 000000000..cbb6aff7e
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py
@@ -0,0 +1,54 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_info
+short_description: Information module for Dataconnect Settings
+description:
+- Get all Dataconnect Settings.
+- This API retrieves the status of the Dataconnect feature.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.get_dataconnect_service,
+
+ - Paths used are
+ get /api/v1/mnt/data-connect/settings,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dataconnect Settings
+ cisco.ise.dataconnect_settings_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "isEnabled": true,
+ "isPasswordChanged": true,
+ "passwordExpiresInDays": 0,
+ "passwordExpiresOn": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py
new file mode 100644
index 000000000..4f731bf44
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py
@@ -0,0 +1,60 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_password
+short_description: Resource module for Dataconnect Settings Password
+description:
+- Manage operation update of the resource Dataconnect Settings Password.
+- This API updates the Dataconnect user password.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ password:
+ description: 'Password for dataconnect user. Password must satisfy the following
+ criteria - Contains at least one uppercase letter A-Z, Contains at least one lowercase
+ letter a-z, Contains at least one digit 0-9, Contains at least one special character
+ #$%&*+,-. ;=?^_~, Has at least 12 characters, Has not more than 30 characters.'
+ type: str
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.update_dataconnect_password,
+
+ - Paths used are
+ put /api/v1/mnt/data-connect/settings/password,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.dataconnect_settings_password:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ password: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py
new file mode 100644
index 000000000..ec4897b57
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py
@@ -0,0 +1,57 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dataconnect_settings_password_expiry
+short_description: Resource module for Dataconnect Settings Password Expiry
+description:
+- Manage operation update of the resource Dataconnect Settings Password Expiry.
+- This API updates the number of days of Dataconnect password expiry.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ passwordExpiresInDays:
+ description: Dataconnect Settings Password Expiry's passwordExpiresInDays.
+ type: int
+requirements:
+- ciscoisesdk >= 2.1.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ dataconnect_services.DataconnectServices.update_dataconnect_password_expiry,
+
+ - Paths used are
+ put /api/v1/mnt/data-connect/settings/password/expiry,
+
+"""
+
+EXAMPLES = r"""
+- name: Update all
+ cisco.ise.dataconnect_settings_password_expiry:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ passwordExpiresInDays: 0
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py
index 88fa0ce86..f782455ec 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py
@@ -6,44 +6,39 @@
DOCUMENTATION = r"""
---
-module: trustsec_vn_bulk_delete
-short_description: Resource module for Trustsec VN Bulk Delete
+module: dataconnect_settings_status
+short_description: Resource module for Dataconnect Settings Status
description:
-- Manage operation create of the resource Trustsec VN Bulk Delete.
-version_added: '2.0.0'
+- Manage operation update of the resource Dataconnect Settings Status.
+- This API updates the DataConnect feature status.
+version_added: '2.8.0'
extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
- payload:
- description: Trustsec VN Bulk Delete's payload.
- elements: str
- type: list
+ isEnabled:
+ description: IsEnabled flag.
+ type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
notes:
- SDK Method used are
- virtual_network.VirtualNetwork.bulk_delete_virtual_networks,
+ dataconnect_services.DataconnectServices.set_data_connect_service,
- Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/delete,
+ put /api/v1/mnt/data-connect/settings/status,
"""
EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_delete:
+- name: Update all
+ cisco.ise.dataconnect_settings_status:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
- payload:
- - string
+ isEnabled: true
"""
@@ -54,6 +49,9 @@ ise_response:
type: dict
sample: >
{
- "id": "string"
+ "success": {
+ "message": "string"
+ },
+ "version": "string"
}
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
index bc2f70749..f09b21d69 100644
--- a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py
@@ -21,7 +21,7 @@ options:
- How long to wait for the server to send data before giving up.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PullDeploymentInfo
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
index a238380a1..c65a26ede 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
index 29c2db6d3..e0a283492 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py
@@ -21,6 +21,9 @@ options:
id:
description: Id path parameter. Rule id.
type: str
+ identitySourceId:
+ description: Identity source id from the identity stores.
+ type: str
identitySourceName:
description: Identity source name from the identity stores.
type: str
@@ -56,6 +59,9 @@ options:
condition:
description: Device Administration Authentication Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -102,11 +108,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authentication Rules's endDate.
@@ -116,11 +123,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authentication Rules's endDate.
@@ -140,8 +148,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authentication Rules's endTime.
@@ -152,8 +160,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authentication Rules's endTime.
@@ -221,7 +229,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
@@ -248,6 +256,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -259,6 +268,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +321,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
id: string
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -322,6 +333,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -385,6 +397,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -407,6 +420,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -462,6 +476,7 @@ ise_update_response:
sample: >
{
"response": {
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -484,6 +499,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
index 3e0dfce6a..6e02cd5b6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authentication Rules
@@ -73,6 +73,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -95,6 +96,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
index a34b3aec1..b2d3dbb1f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
index 1e5058c66..a762b3923 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py
@@ -52,6 +52,9 @@ options:
condition:
description: Device Administration Authorization Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -98,11 +101,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authorization Rules's endDate.
@@ -112,11 +116,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Authorization Rules's endDate.
@@ -136,8 +141,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authorization Rules's endTime.
@@ -148,8 +153,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Authorization Rules's endTime.
@@ -217,7 +222,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
@@ -254,6 +259,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -316,6 +322,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -401,6 +408,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -478,6 +486,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
index 8c5f6de1f..8e01d1e0d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Rules
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
index 23aa5817f..46a9cfcfe 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Command Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
index 9db7c229a..e1d2a666f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py
@@ -20,6 +20,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -65,11 +68,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Conditions's endDate.
@@ -79,11 +82,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Conditions's endDate.
@@ -102,8 +105,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Conditions's endTime.
@@ -113,8 +117,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Conditions's endTime.
@@ -159,7 +164,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -190,6 +195,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -235,6 +241,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -289,6 +296,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -356,6 +364,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -414,6 +423,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
index 073e3b888..f071af305 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
index e2db57818..1fa414c1a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
index c5add18be..6264730c2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
index 90657433a..5fbeeac28 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py
@@ -29,7 +29,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Conditions
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
index c603181b9..efcca2198 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
index f1685f1ae..90c278c57 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
index 74afbb5d2..14aaba870 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
index 6bdd2efe6..a6fb8c2b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py
@@ -49,6 +49,9 @@ options:
condition:
description: Device Administration Global Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -95,11 +98,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Global Exception Rules's endDate.
@@ -109,11 +113,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Global Exception Rules's endDate.
@@ -133,8 +138,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Global Exception Rules's endTime.
@@ -145,8 +150,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Global Exception Rules's endTime.
@@ -214,7 +219,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
@@ -250,6 +255,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +317,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -395,6 +402,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -472,6 +480,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
index 27f969f61..98b4bf506 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
@@ -89,6 +89,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
index 7a7e1a82a..066bbaf1f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
index a0556f723..b870c7121 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Identity Stores
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
index 92fe6d8dc..9b86cab32 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py
@@ -52,6 +52,9 @@ options:
condition:
description: Device Administration Local Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -98,11 +101,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Local Exception Rules's endDate.
@@ -112,11 +116,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Device Administration Local Exception Rules's endDate.
@@ -136,8 +141,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Local Exception Rules's endTime.
@@ -148,8 +153,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Local Exception Rules's endTime.
@@ -217,7 +222,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
@@ -254,6 +259,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -316,6 +322,7 @@ EXAMPLES = r"""
profile: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -401,6 +408,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -478,6 +486,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
index cb1cd9142..953ab8564 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
index 8211eb18a..b549075f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Authorization Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
index 30ade1ac5..67c802d16 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py
@@ -18,75 +18,37 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ cliDnisList:
+ description: <p>This field should contain a Caller ID (CLI), comma, and Called ID
+ (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>.
+ elements: str
+ type: list
conditionType:
description: This field determines the content of the conditions field.
type: str
- conditions:
- description: Device Administration Network Conditions's conditions.
- elements: dict
- suboptions:
- cliDnisList:
- description: <p>This field should contain a Caller ID (CLI), comma, and Called
- ID (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>.
- elements: str
- type: list
- conditionType:
- description: This field determines the content of the conditions field.
- type: str
- description:
- description: Device Administration Network Conditions's description.
- type: str
- deviceGroupList:
- description: <p>This field should contain a tuple with NDG Root, comma, and
- an NDG (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>.
- elements: str
- type: list
- deviceList:
- description: <p>This field should contain Device-Name,port-number. The device
- name must be the same as the name field in a Network Device object.<br> Line
- format - Device Name,Port</p>.
- elements: str
- type: list
- id:
- description: Device Administration Network Conditions's id.
- type: str
- ipAddrList:
- description: <p>This field should contain IP-address-or-subnet,port number<br>
- IP address can be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br>
- IP subnet can be IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br>
- Line format - IP Address or subnet,Port</p>.
- elements: str
- type: list
- link:
- description: Device Administration Network Conditions's link.
- suboptions:
- href:
- description: Device Administration Network Conditions's href.
- type: str
- rel:
- description: Device Administration Network Conditions's rel.
- type: str
- type:
- description: Device Administration Network Conditions's type.
- type: str
- type: dict
- macAddrList:
- description: <p>This field should contain Endstation MAC address, comma, and
- Destination MAC addresses.<br> Each Max address must include twelve hexadecimal
- digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn
- or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>.
- elements: str
- type: list
- name:
- description: Network Condition name.
- type: str
- type: list
description:
description: Device Administration Network Conditions's description.
type: str
+ deviceGroupList:
+ description: <p>This field should contain a tuple with NDG Root, comma, and an NDG
+ (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>.
+ elements: str
+ type: list
+ deviceList:
+ description: <p>This field should contain Device Name. The device name must be the
+ same as the name field in a Network Device object. Line format - Device Name</p>.
+ elements: str
+ type: list
id:
description: Device Administration Network Conditions's id.
type: str
+ ipAddrList:
+ description: <p>This field should contain IP address or subnet.<br> IP address can
+ be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> IP subnet can be
+ IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> Line format -
+ IP Address or subnet</p>.
+ elements: str
+ type: list
link:
description: Device Administration Network Conditions's link.
suboptions:
@@ -100,11 +62,18 @@ options:
description: Device Administration Network Conditions's type.
type: str
type: dict
+ macAddrList:
+ description: <p>This field should contain Endstation MAC address, comma, and Destination
+ MAC addresses.<br> Each Max address must include twelve hexadecimal digits using
+ formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br>
+ Line format - Endstation MAC,Destination MAC </p>.
+ elements: str
+ type: list
name:
description: Network Condition name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Network Conditions
@@ -131,32 +100,23 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ cliDnisList:
+ - string
conditionType: string
- conditions:
- - cliDnisList:
- - string
- conditionType: string
- description: string
- deviceGroupList:
- - string
- deviceList:
- - string
- id: string
- ipAddrList:
- - string
- link:
- href: string
- rel: string
- type: string
- macAddrList:
- - string
- name: string
description: string
+ deviceGroupList:
+ - string
+ deviceList:
+ - string
id: string
+ ipAddrList:
+ - string
link:
href: string
rel: string
type: string
+ macAddrList:
+ - string
name: string
- name: Update by id
@@ -166,32 +126,23 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ cliDnisList:
+ - string
conditionType: string
- conditions:
- - cliDnisList:
- - string
- conditionType: string
- description: string
- deviceGroupList:
- - string
- deviceList:
- - string
- id: string
- ipAddrList:
- - string
- link:
- href: string
- rel: string
- type: string
- macAddrList:
- - string
- name: string
description: string
+ deviceGroupList:
+ - string
+ deviceList:
+ - string
id: string
+ ipAddrList:
+ - string
link:
href: string
rel: string
type: string
+ macAddrList:
+ - string
name: string
- name: Delete by id
@@ -221,33 +172,20 @@ ise_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
}
@@ -268,33 +206,20 @@ ise_update_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
},
"version": "string"
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
index 318e50bb8..59c2eb239 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Network Conditions
@@ -76,33 +76,20 @@ ise_response:
"type": "string"
},
"name": "string",
- "conditions": [
- {
- "cliDnisList": [
- "string"
- ],
- "conditionType": "string",
- "description": "string",
- "id": "string",
- "ipAddrList": [
- "string"
- ],
- "link": {
- "href": "string",
- "rel": "string",
- "type": "string"
- },
- "macAddrList": [
- "string"
- ],
- "name": "string",
- "deviceGroupList": [
- "string"
- ],
- "deviceList": [
- "string"
- ]
- }
+ "deviceList": [
+ "string"
+ ],
+ "cliDnisList": [
+ "string"
+ ],
+ "ipAddrList": [
+ "string"
+ ],
+ "macAddrList": [
+ "string"
+ ],
+ "deviceGroupList": [
+ "string"
]
}
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
index b6db2058a..fb0f769a1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py
@@ -21,6 +21,9 @@ options:
condition:
description: Device Administration Policy Set's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -66,11 +69,11 @@ options:
additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Policy Set's endDate.
@@ -80,11 +83,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Policy Set's endDate.
@@ -103,8 +106,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Policy Set's endTime.
@@ -114,8 +118,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Policy Set's endTime.
@@ -205,7 +210,7 @@ options:
matched.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
@@ -233,6 +238,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -292,6 +298,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -373,6 +380,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -447,6 +455,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
index c6894900b..fb996df50 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
@@ -79,6 +79,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
index 88893a0d7..609e0b122 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Policy Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
index 2a72e4e98..2aba7c1bd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Profiles
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
index 0cd8de91e..77a27332f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Service Names
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
index 0e115d18a..c5326d8cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py
@@ -18,6 +18,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -63,11 +66,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Time Date Conditions's endDate.
@@ -77,11 +80,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Device Administration Time Date Conditions's endDate.
@@ -100,8 +103,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Time Date Conditions's endTime.
@@ -111,8 +115,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Device Administration Time Date Conditions's endTime.
@@ -157,7 +162,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Time/Date Conditions
@@ -184,6 +189,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -229,6 +235,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
index 55a513840..26c796202 100644
--- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Device Administration - Time/Date Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py
new file mode 100644
index 000000000..85bb07b7b
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py
@@ -0,0 +1,49 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: dictionary_references_info
+short_description: Information module for Dictionary References Info
+description:
+- Get all Dictionary References Info.
+- EDDA - Get a map of references to EDDA dictionaries.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options: {}
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.get_edda_dictionary_references,
+
+ - Paths used are
+ get /api/v1/edda/dictionary-references,
+
+"""
+
+EXAMPLES = r"""
+- name: Get all Dictionary References Info
+ cisco.ise.dictionary_references_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {}
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
index 213fcdbd8..f4cd77e29 100644
--- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
+++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py
@@ -35,7 +35,7 @@ options:
characters _.-.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
index 3931cddac..cb35f5056 100644
--- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
index ac0e06b76..15af377c6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py
@@ -44,7 +44,7 @@ options:
description: Egress Matrix Cell's sourceSGtId.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
index a24a81b0a..716e9dad9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
index 88df775ee..dd45607d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Egress Matrix Cell Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
index 3e3253397..d5edb3ede 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
index 7dd4fda31..90483a2ea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py
@@ -26,7 +26,7 @@ options:
description: SrcSGtId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
index eeb4655a8..309b8f242 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
index 1f416034c..ca6f394eb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
+++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py
@@ -20,7 +20,7 @@ options:
description: Status path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint.py
index 74db5cd17..d6c3db64f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint.py
@@ -102,7 +102,7 @@ options:
description: StaticProfileAssignment flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -147,6 +147,7 @@ EXAMPLES = r"""
mdmReachable: true
mdmSerial: string
mdmServerName: string
+ name: string
portalUser: string
profileId: string
staticGroupAssignment: true
@@ -189,6 +190,7 @@ EXAMPLES = r"""
mdmReachable: true
mdmSerial: string
mdmServerName: string
+ name: string
portalUser: string
profileId: string
staticGroupAssignment: true
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
index 520910f40..920378939 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
index dafe2a80c..f74c5d1f6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Endpoint Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
index 8f31278f4..be6995cbb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py
@@ -48,7 +48,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointCertificate
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
index 2835d630e..53f050168 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
index a99a9c024..7507f3e70 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
index 95dd6f659..bf2cf58b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py
@@ -31,7 +31,7 @@ options:
description: SystemDefined flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointIdentityGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
index 89823b7c6..0850f50a4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for EndpointIdentityGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
index 01587f8b7..88a81827d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
index 139631d20..8807a6b11 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py
@@ -100,7 +100,7 @@ options:
description: StaticProfileAssignment flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
index 82888e4e8..e86e63d9a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
+++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
index 50d1ff071..0c16d8c98 100644
--- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
+++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py
@@ -67,7 +67,7 @@ options:
description: Valid Range 1 to 120.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
index 8b597d056..98bb7c155 100644
--- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
index 9a23b0c1f..c7b3f5696 100644
--- a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py
@@ -35,7 +35,7 @@ options:
description: Virtual Network. At least one of subnet or sgt or vn should be defined.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
index 01f9c6e74..486c4c0f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
index 2c82fa379..98f77ab17 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
index 10910f02a..1f7fc6f17 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py
@@ -54,7 +54,7 @@ options:
description: Username of Secure SMTP server.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
index 7f815219d..dec4146c7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
index 8caf673c0..3dac851e9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py
@@ -26,7 +26,7 @@ options:
characters _.-.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
index 087a7e0e4..40cc1eaeb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type.py b/ansible_collections/cisco/ise/plugins/modules/guest_type.py
index 2318caaae..4ac0b34d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type.py
@@ -120,7 +120,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
index 12b593e2f..9f386a62b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
index dcf1461ac..9a77176b1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
index d35072caa..08e88c869 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py
@@ -31,7 +31,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user.py b/ansible_collections/cisco/ise/plugins/modules/guest_user.py
index a19118c76..f65ae8c24 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user.py
@@ -115,7 +115,7 @@ options:
description: Guest User's statusReason.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
index f5c0295f2..a8aa5dd45 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
index f26fe7649..0445a7379 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
index 454b982ae..5542a71ce 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Guest User Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
index 64dc01930..701c53136 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py
@@ -31,7 +31,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
index b02f5e41c..b4308026a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
index f0ba73a22..94fb4f6a2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py
@@ -34,7 +34,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
index 651777e00..7713cb784 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
index 0ead09e64..36a8001e0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py
@@ -24,7 +24,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
index b55a3147c..a544c1707 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
index d02bd0d38..1c9ffa411 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py
@@ -23,7 +23,7 @@ options:
description: PortalId path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
index e53ed5f2d..93c2e0d28 100644
--- a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
+++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py
@@ -35,7 +35,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
index 90d37d154..ddc28f545 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
index d4cef09b0..143c1acad 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py
@@ -25,7 +25,7 @@ options:
description: Hotpatch Install's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
index d1ce43a88..7db0ae257 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py
@@ -25,7 +25,7 @@ options:
description: Hotpatch Rollback's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
index aa7f55914..f8047fc0c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py
@@ -251,7 +251,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
index e2cbb7481..fe316031c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
index 259f25ae9..fa0906397 100644
--- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py
@@ -48,7 +48,7 @@ options:
description: Id Store Sequence's parent.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentitySequence
diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
index 16e99cfb3..1903ae417 100644
--- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentitySequence
diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group.py b/ansible_collections/cisco/ise/plugins/modules/identity_group.py
index c9e017ada..13dfda39f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/identity_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/identity_group.py
@@ -30,7 +30,7 @@ options:
description: Identity Group's parent.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
index 460a381e5..c2acbc9d3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IdentityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user.py b/ansible_collections/cisco/ise/plugins/modules/internal_user.py
index 4769df6bb..238b344b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/internal_user.py
+++ b/ansible_collections/cisco/ise/plugins/modules/internal_user.py
@@ -69,7 +69,7 @@ options:
description: The id store where the internal user's password is kept.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
index 7f90f3836..eb6da52de 100644
--- a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
index 2eb5f7e01..c61db07fd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py
@@ -21,7 +21,7 @@ options:
CSR.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
index f5cbe33a2..46a7b777d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
index 5f4f2067e..b594f90db 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
index 282279015..0ecf5b696 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
index 297121891..b224fdcc8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py
@@ -34,7 +34,7 @@ options:
description: Token.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
index 121e10383..d88e0e987 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
index 73c71772a..85dcd4876 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
index 0267753df..e82937305 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
index b48863dce..fe66204bd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py
@@ -28,7 +28,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
index a85e9ea20..11ef62dae 100644
--- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Licensing
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
index f17ae2533..8a64d0eb2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py
@@ -24,7 +24,7 @@ options:
- Duration path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
index 6a6d498fd..fd9138adf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py
@@ -28,7 +28,7 @@ options:
- RECORDS path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
index fb1b30fb0..5a033a6c9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py
@@ -28,7 +28,7 @@ options:
- RECORDS path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
index 53e936d10..6ffa6c354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
index c2ffbff89..0a0bf0c25 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
index 352e09bf6..e62b3ef9b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
index 716b60cd0..44685ba33 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
index f908a7a69..ec45c8782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py
@@ -20,7 +20,7 @@ options:
- Endpoint_ipv4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
index 754aebbc8..d9a4bcfb3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py
@@ -20,7 +20,7 @@ options:
- Mac path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
index 09f23798e..d6f0fa959 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py
@@ -20,7 +20,7 @@ options:
- Nas_ipv4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
index 81c750499..548da9c6b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py
@@ -20,7 +20,7 @@ options:
- Username path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
index a9df0152d..63b7fa1aa 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
index 5f1be8c8f..8de5ed1d5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py
@@ -36,7 +36,7 @@ options:
- NAS_IPV4 path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
index 5c8869a93..774d9709a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
index 5a8db7deb..05494c7d6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
index d0516ee47..9f1e55b73 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py
@@ -28,7 +28,7 @@ options:
- REAUTH_TYPE path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
index d614bab85..b00af3952 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py
@@ -20,7 +20,7 @@ options:
- Session_id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
index 7217600d6..c26efbd54 100644
--- a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
index bdec90ade..5677290f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py
@@ -275,7 +275,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
index c0c1cd87a..742308c72 100644
--- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
index e34a702c8..c250782f3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py
@@ -48,7 +48,7 @@ options:
type: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NativeSupplicantProfile
diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
index f086ded1e..5976821cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NativeSupplicantProfile
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
index 33ea47623..4b3be685e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py
@@ -21,6 +21,9 @@ options:
id:
description: Id path parameter. Rule id.
type: str
+ identitySourceId:
+ description: Identity source id from the identity stores.
+ type: str
identitySourceName:
description: Identity source name from the identity stores.
type: str
@@ -56,6 +59,9 @@ options:
condition:
description: Network Access Authentication Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -102,11 +108,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authentication Rules's endDate.
@@ -116,11 +123,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authentication Rules's endDate.
@@ -140,8 +148,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authentication Rules's endTime.
@@ -152,8 +160,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authentication Rules's endTime.
@@ -221,7 +229,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
@@ -248,6 +256,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -259,6 +268,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -311,6 +321,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
id: string
+ identitySourceId: string
identitySourceName: string
ifAuthFail: string
ifProcessFail: string
@@ -322,6 +333,7 @@ EXAMPLES = r"""
policyId: string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -385,6 +397,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -407,6 +420,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -462,6 +476,7 @@ ise_update_response:
sample: >
{
"response": {
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -484,6 +499,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
index a41243427..f121dc6f2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
@@ -73,6 +73,7 @@ ise_response:
type: dict
sample: >
{
+ "identitySourceId": "string",
"identitySourceName": "string",
"ifAuthFail": "string",
"ifProcessFail": "string",
@@ -95,6 +96,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
index 1d4de88e7..e3e918c5f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authentication Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
index 03b4c64bc..11cb7caff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py
@@ -47,6 +47,9 @@ options:
condition:
description: Network Access Authorization Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -93,11 +96,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authorization Rules's endDate.
@@ -107,11 +111,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Authorization Rules's endDate.
@@ -131,8 +136,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authorization Rules's endTime.
@@ -143,8 +148,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Authorization Rules's endTime.
@@ -215,7 +220,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
@@ -251,6 +256,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -313,6 +319,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -398,6 +405,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -475,6 +483,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
index ec93647e4..6a5f812d3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
@@ -94,6 +94,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
index 55dfe008f..fc9311404 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
index 6321335dd..b5abc72da 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py
@@ -20,6 +20,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -65,11 +68,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Conditions's endDate.
@@ -79,11 +82,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Conditions's endDate.
@@ -102,8 +105,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Conditions's endTime.
@@ -113,8 +117,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Conditions's endTime.
@@ -159,7 +164,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -190,6 +195,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -235,6 +241,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -289,6 +296,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -356,6 +364,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -414,6 +423,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
index bb37744f0..d1977079d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
index be93e370a..1c33ff340 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
index a8739b029..eb9d44889 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -63,6 +63,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
index 79273501d..04f96b355 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py
@@ -29,7 +29,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Conditions
@@ -95,6 +95,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
index 161c04bc2..64b1abb37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py
@@ -47,7 +47,7 @@ options:
description: The dictionary version.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
index 4a029c5c9..2572d3833 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py
@@ -55,7 +55,7 @@ options:
description: The dictionary attribute's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attribute
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
index 92346b680..117323aac 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py
@@ -27,7 +27,7 @@ options:
- Name path parameter. The dictionary attribute name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attribute
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
index fc420dbf0..cf7b71905 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
index 88a0a1f00..7325147f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
index 4d82fae8f..07ac1479c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary Attributes List
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
index 4334d5172..7ddff701a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py
@@ -23,7 +23,7 @@ options:
- Name path parameter. The dictionary name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Dictionary
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
index 67f0456d5..cb6eb3e48 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py
@@ -44,6 +44,9 @@ options:
condition:
description: Network Access Global Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -90,11 +93,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Global Exception Rules's endDate.
@@ -104,11 +108,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Global Exception Rules's endDate.
@@ -128,8 +133,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Global Exception Rules's endTime.
@@ -140,8 +145,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Global Exception Rules's endTime.
@@ -212,7 +217,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
@@ -247,6 +252,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -308,6 +314,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -392,6 +399,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -469,6 +477,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
index 168ed354f..e98c99cb6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
@@ -88,6 +88,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
index 8047fc1d5..de070305f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
index 5bdc15cf7..50c59b392 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Identity Stores
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
index 8f88a5fa3..94bd67b35 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py
@@ -47,6 +47,9 @@ options:
condition:
description: Network Access Local Exception Rules's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -93,11 +96,12 @@ options:
that additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Local Exception Rules's endDate.
@@ -107,11 +111,12 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have
+ no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
+ = year)</p>.
suboptions:
endDate:
description: Network Access Local Exception Rules's endDate.
@@ -131,8 +136,8 @@ options:
type: str
hoursRange:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Local Exception Rules's endTime.
@@ -143,8 +148,8 @@ options:
type: dict
hoursRangeException:
description: <p>Defines for which hours a TimeAndDate condition will be
- matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default
- - All Day </p>.
+ matched or not matched if used in exceptionHours property<br> Time foramt
+ - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Local Exception Rules's endTime.
@@ -215,7 +220,7 @@ options:
description: Security group used in authorization policies.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
@@ -251,6 +256,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -313,6 +319,7 @@ EXAMPLES = r"""
- string
rule:
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -398,6 +405,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -475,6 +483,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
index d93c9bef2..572027db8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py
@@ -27,7 +27,7 @@ options:
- Id path parameter. Rule id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
@@ -94,6 +94,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
index 25751d4b6..a7e32207d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py
@@ -20,7 +20,7 @@ options:
description: PolicyId path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Authorization Exception Rules
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
index bbdfb592a..4cf768c5d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py
@@ -64,17 +64,17 @@ options:
type: str
type: dict
macAddrList:
- description: <p>This field should contain Endstation MAC address, comma, and
- Destination MAC addresses.<br> Each Max address must include twelve hexadecimal
- digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn
- or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>.
+ description: <p>This field should contain Endstation MAC address, comma, and Destination
+ MAC addresses.<br> Each Max address must include twelve hexadecimal digits using
+ formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br>
+ Line format - Endstation MAC,Destination MAC </p>.
elements: str
type: list
name:
description: Network Condition name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Network Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
index 8d4f5aef7..063585c97 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Network Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
index 5d7e27b0c..8e98f1cb8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py
@@ -21,6 +21,9 @@ options:
condition:
description: Network Access Policy Set's condition.
suboptions:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -66,11 +69,11 @@ options:
additional conditions are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Policy Set's endDate.
@@ -80,11 +83,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used
- for start/end date <br> Default - no specific dates<br> In order to reset
- the dates to have no specific dates Date format - yyyy-mm-dd (MM = month,
- dd = day, yyyy = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched
+ or NOT matched if used in exceptionDates prooperty<br> Options are - Date
+ range, for specific date, the same date should be used for start/end date
+ <br> Default - no specific dates<br> In order to reset the dates to have no
+ specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Policy Set's endDate.
@@ -103,8 +106,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Policy Set's endTime.
@@ -114,8 +118,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm
+ ( h = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Policy Set's endTime.
@@ -205,7 +210,7 @@ options:
matched.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
@@ -233,6 +238,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -292,6 +298,7 @@ EXAMPLES = r"""
ise_verify: "{{ise_verify}}"
state: present
condition:
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -373,6 +380,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
@@ -447,6 +455,7 @@ ise_update_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
index eb1515840..7c5c9d535 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Policy id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
@@ -79,6 +79,7 @@ ise_response:
"id": "string",
"name": "string",
"attributeName": "string",
+ "attributeId": "string",
"attributeValue": "string",
"dictionaryName": "string",
"dictionaryValue": "string",
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
index 66f6b6ca2..ceda451e8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Policy Set
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
index 74a8ea784..5c954e513 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Profiles
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
index 660fab707..bcb6d16c9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Security Groups
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
index 3bcb433ad..1f63e6c1c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Service Names
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
index 15d981449..efa5d901c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py
@@ -18,6 +18,9 @@ extends_documentation_fragment:
- cisco.ise.module
author: Rafael Campos (@racampos)
options:
+ attributeId:
+ description: Dictionary attribute id (Optional), used for additional verification.
+ type: str
attributeName:
description: Dictionary attribute name.
type: str
@@ -63,11 +66,11 @@ options:
are present under the children field</li></ul>.
type: str
datesRange:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Time Date Conditions's endDate.
@@ -77,11 +80,11 @@ options:
type: str
type: dict
datesRangeException:
- description: <p>Defines for which date/s TimeAndDate condition will be matched<br>
- Options are - Date range, for specific date, the same date should be used for
- start/end date <br> Default - no specific dates<br> In order to reset the dates
- to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy
- = year)</p>.
+ description: <p>Defines for which date/s TimeAndDate condition will be matched or
+ NOT matched if used in exceptionDates prooperty<br> Options are - Date range,
+ for specific date, the same date should be used for start/end date <br> Default
+ - no specific dates<br> In order to reset the dates to have no specific dates
+ Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>.
suboptions:
endDate:
description: Network Access Time Date Conditions's endDate.
@@ -100,8 +103,9 @@ options:
description: Dictionary value.
type: str
hoursRange:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Time Date Conditions's endTime.
@@ -111,8 +115,9 @@ options:
type: str
type: dict
hoursRangeException:
- description: <p>Defines for which hours a TimeAndDate condition will be matched<br>
- Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>.
+ description: <p>Defines for which hours a TimeAndDate condition will be matched
+ or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h
+ = hour , mm = minutes ) <br> Default - All Day </p>.
suboptions:
endTime:
description: Network Access Time Date Conditions's endTime.
@@ -157,7 +162,7 @@ options:
elements: str
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Time/Date Conditions
@@ -184,6 +189,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
@@ -229,6 +235,7 @@ EXAMPLES = r"""
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
state: present
+ attributeId: string
attributeName: string
attributeValue: string
children:
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
index aa22bfe90..eb6ee1b0b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py
@@ -23,7 +23,7 @@ options:
- Id path parameter. Condition id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Network Access - Time/Date Conditions
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device.py b/ansible_collections/cisco/ise/plugins/modules/network_device.py
index 57a20dade..cde422c7a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device.py
@@ -191,7 +191,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
index 7f8850311..8a766835d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
index 0489df3c0..530df579b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: Network Device Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
index 12515718d..d2c17dd56 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py
@@ -27,11 +27,11 @@ options:
name:
description: Network Device Group's name.
type: str
- othername:
- description: Network Device Group's othername.
+ ndgtype:
+ description: Network Device Group's ndgtype.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -57,7 +57,7 @@ EXAMPLES = r"""
description: string
id: string
name: string
- othername: string
+ ndgtype: string
- name: Delete by id
cisco.ise.network_device_group:
@@ -77,7 +77,7 @@ EXAMPLES = r"""
state: present
description: string
name: string
- othername: string
+ ndgtype: string
"""
@@ -96,7 +96,7 @@ ise_response:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
ise_update_response:
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
index f729d6e40..757237f1d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py
@@ -73,7 +73,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
@@ -138,7 +138,7 @@ ise_response:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
ise_responses:
@@ -158,7 +158,7 @@ ise_responses:
"href": "string",
"type": "string"
},
- "othername": "string"
+ "ndgtype": "string"
}
]
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
index 95ef6fce3..36505fec4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
index 4af07b070..237154029 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py
@@ -42,7 +42,7 @@ options:
description: Node Deployment's userName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
index 76363516c..86af43a84 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py
@@ -49,7 +49,7 @@ options:
- Hostname path parameter. Hostname of the deployed node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
index 5d3d60c9d..fd2e3ecca 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py
@@ -20,7 +20,7 @@ options:
description: Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group.py b/ansible_collections/cisco/ise/plugins/modules/node_group.py
index 8e28165f3..04fcc0f7d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group.py
@@ -52,7 +52,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
index ee2f50ae4..4fbf7af0f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py
@@ -23,7 +23,7 @@ options:
- NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
index f57f5233b..6a70be798 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py
@@ -23,7 +23,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
index 0097d0c8a..84fc6b947 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py
@@ -23,7 +23,7 @@ options:
description: NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
index 46ed0b9e2..a2fbd4294 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py
@@ -21,7 +21,7 @@ options:
- NodeGroupName path parameter. Name of the existing node group.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Group
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_info.py
index e0ca47517..92e80d782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_info.py
@@ -63,7 +63,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for NodeDetails
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
index e83c1922a..a9d2c776f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
index c3c0bf922..8c6582275 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py
@@ -19,7 +19,7 @@ options:
description: Node Promotion's promotionType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
index 86c442d19..430ddc187 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py
@@ -20,7 +20,7 @@ options:
- Node path parameter. ID of the existing node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
index 236082dc5..f837ebfe1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
index 893da855f..15d3d06b2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
index b47eff3a2..1307411ce 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py
@@ -140,7 +140,7 @@ options:
type: int
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
index 106563972..c65326de2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
index af5961ad1..fc29dc3e5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py
@@ -23,7 +23,7 @@ options:
description: Node Services SXP Interfaces's interface.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
index fdd2716d0..3c2f925d9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py
@@ -21,7 +21,7 @@ options:
- Hostname path parameter. Hostname of the node.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Services
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
index c397cb326..67160219b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py
@@ -21,7 +21,7 @@ options:
type: str
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Node Deployment
diff --git a/ansible_collections/cisco/ise/plugins/modules/node_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_sync.py
index e45a0ae17..7389635e4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/node_sync.py
+++ b/ansible_collections/cisco/ise/plugins/modules/node_sync.py
@@ -19,7 +19,7 @@ options:
description: Node Sync's hostname.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
index 0a33b80f7..3029954f9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py
@@ -31,7 +31,7 @@ options:
description: Pan Ha's secondaryHealthCheckNode.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
index 6a6ae62b4..3061000ca 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py
@@ -20,7 +20,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PAN HA
diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
index 6f0526a0f..9a8b048b2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py
@@ -42,7 +42,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PAN HA
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_info.py b/ansible_collections/cisco/ise/plugins/modules/patch_info.py
index ec427e641..ba13a4851 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_install.py b/ansible_collections/cisco/ise/plugins/modules/patch_install.py
index 94d41ea7e..d2a1bfc92 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_install.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_install.py
@@ -25,7 +25,7 @@ options:
description: Patch Install's repositoryName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
index f82dc23d3..2838048f8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
+++ b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py
@@ -22,7 +22,7 @@ options:
description: Patch Rollback's patchNumber.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Patching
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
index 5c3e74e18..af332d5c2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py
@@ -23,7 +23,7 @@ options:
description: Portal Global Setting's id.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
index e0bc9c260..ae481c4a3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_info.py
index 315df0838..2d9654517 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
index f20992749..8554639f4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py
@@ -31,7 +31,7 @@ options:
description: Portal Theme for all portals.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
index eaa5a691e..bc1fb3884 100644
--- a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
index be32314da..9ddd192b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
index 92f4ad27d..a4bb5b688 100644
--- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py
@@ -35,7 +35,7 @@ options:
description: User name for the proxy connection.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for proxy
diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
index d14440bd3..989e22add 100644
--- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for proxy
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
index 172dab5fd..8cb0c132b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
index a620e17c3..bac63eb41 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
index 43f0e9570..7241dcd52 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
index 886991e98..e87b41303 100644
--- a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py
@@ -23,7 +23,7 @@ options:
description: Auto approve certificate based accounts when true.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
index dca5b999a..358d777f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Access Secret's peerNodeName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
index 8e2571b08..bcb84e34a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Account Activate's description.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
index 4de7c8682..83a6b2f8a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Account Create's nodeName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
index 7eaf7442e..13022cd27 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
index 9a27324c0..d7d05cf37 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
index 33b2e21e8..2e6450f32 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
index 38f89a6a6..b2024371d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
index 49bcc5e50..55e255bc3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
index 15a6ff349..a9c6fa00f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
index bdedd95d3..ef1ddf642 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
index eec046210..9224eb08e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
index 475b9224d..dc552be6d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
index d247161bb..f5963ddf2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
index c58e44198..f808e5cc7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
index 5248f7a1c..16c42889c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py
@@ -20,7 +20,7 @@ options:
description: Name path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
index 19f716365..5da12013d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
index 9f14887ec..f9a4767c1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
index 94944e789..687581cea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
index b003c9148..c41be5560 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
index dd6867c42..2abc51e1e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
index 5787aecb0..755a1231f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Service Lookup's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
index c78f2df86..4484573af 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py
@@ -19,7 +19,7 @@ options:
description: pxGrid Service Register's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
index a79a00ddb..b91798631 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
index f0316a4fd..3926a9960 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
index 6260c36ec..df9720cb7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
index 6ddea6645..56a5e9204 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
index c9b3c9751..6e3ca80eb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
index bf910ac3e..9f0305ab6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
index fb1b90ca8..3203ed0b8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py
@@ -23,7 +23,7 @@ options:
description: Auto approve certificate based accounts when true.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
index a7667adb8..e3b54fa92 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
index 407c42f89..3add71347 100644
--- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py
@@ -16,7 +16,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
index 6bf112bd0..8031470a4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py
@@ -103,7 +103,7 @@ options:
description: UseAttrSetOnRequest flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
index 91097fdd8..1073928ea 100644
--- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
index d91ea35b4..a4561a02b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py
@@ -20,7 +20,7 @@ options:
description: Renew Certificate's certType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository.py b/ansible_collections/cisco/ise/plugins/modules/repository.py
index a9236c8f8..635d1d464 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository.py
@@ -45,7 +45,7 @@ options:
description: Username may contain alphanumeric and _-./@\\$ characters.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
index c70d8b7b6..32f628688 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py
@@ -21,7 +21,7 @@ options:
- RepositoryName path parameter. Unique name for a repository.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_info.py
index 524e63a96..6631f499b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/repository_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/repository_info.py
@@ -23,7 +23,7 @@ options:
- RepositoryName path parameter. Unique name for a repository.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Repository
diff --git a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
index b8989b7be..826afa9c8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py
@@ -21,7 +21,7 @@ options:
- Resource path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
index f39aaf8d9..a91c0b4f8 100644
--- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
+++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py
@@ -48,6 +48,14 @@ options:
description: Suffix of the username domain.
type: str
type: dict
+ ersRESTIDStoreUserAttributes:
+ description: REST Id Store's ersRESTIDStoreUserAttributes.
+ suboptions:
+ attributes:
+ description: REST Id Store's attributes.
+ elements: str
+ type: list
+ type: dict
id:
description: REST Id Store's id.
type: str
@@ -55,7 +63,7 @@ options:
description: REST Id Store's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.0.1
- python >= 3.5
notes:
- SDK Method used are
@@ -144,6 +152,9 @@ EXAMPLES = r"""
predefined: string
rootUrl: string
usernameSuffix: string
+ ersRestIDStoreUserAttributes:
+ attributes:
+ - string
name: string
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
index f9d5a1cd7..07a3b19e2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py
@@ -71,7 +71,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
index a7b264ffa..81b396660 100644
--- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py
@@ -682,7 +682,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SelfRegisteredPortal
diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
index 42d009798..5d1952ed7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SelfRegisteredPortal
diff --git a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
index eecd7b549..84be20739 100644
--- a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py
@@ -119,7 +119,7 @@ options:
description: Certificate state (ST).
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
index 59be20e3d..8d531833a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for PsnNodeDetailsWithRadiusService
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
index ba6fd695f..8f6d53354 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py
@@ -43,7 +43,7 @@ options:
description: SGACL's name.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
index d23f90b52..814837559 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
index 7ffae3189..79dd73025 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SGACL Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
index 3ea64a8bf..b3c4cae7c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupsACLs
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
index 8bd08e3aa..9d27da3cb 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py
@@ -44,7 +44,7 @@ options:
description: Mandatory unless mappingGroup is set.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
index 6814106ac..c0988da7c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
index aa8d7f738..c3298c551 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG Mapping Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
index d40159d18..97b9c2368 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
index 20686b4ca..317037a5b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
index 605873b86..40a7adb84 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
index 2f20a7967..6b6d7fcd0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py
@@ -34,7 +34,7 @@ options:
description: Mandatory unless mappingGroup is set.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
index 856788bf7..cd6af8a56 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
index f8f97da73..18ed1150d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG Mapping Group Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
index 2b35f9ba2..1012ababc 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py
@@ -20,7 +20,7 @@ options:
description: Id path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
index 666c65d77..08b7223e2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
index 3f3cf6adf..f02d6260a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
index 725b00d80..c05b582ff 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMappingGroup
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
index 3ebb64ac7..cc46a2d6a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for IPToSGTMapping
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
index 4fb8805fc..bba7eeb3a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py
@@ -71,7 +71,7 @@ options:
type: list
type: list
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
index b97da0a72..ceebe7245 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
index 958cf4055..c466ec4a7 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SG To VN To VLAN Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
index 18394741f..5759bcbdf 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py
@@ -57,7 +57,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroupToVirtualNetwork
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt.py b/ansible_collections/cisco/ise/plugins/modules/sgt.py
index c7d7e013b..7d65c2e9a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt.py
@@ -46,7 +46,7 @@ options:
type: int
required: true
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
index f8776d485..29ffa4038 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
index c295c10b8..6afae3073 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SGt Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
index 0e483e947..98190f097 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SecurityGroups
diff --git a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
index 6b6beed7c..38175a56e 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py
@@ -59,7 +59,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
index e684f9371..be39a7e2c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py
@@ -120,7 +120,7 @@ options:
type: bool
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
index b6892c6fa..88e4f9599 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
index c49c76f41..4d782aa71 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py
@@ -59,7 +59,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
index 22b53b5fa..6acb22f0f 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py
@@ -281,7 +281,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
index 8fafce1d2..9c51373f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
index 85f386446..e8f99c386 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py
@@ -385,7 +385,7 @@ options:
type: dict
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
index d4e2649a6..017236454 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber.py b/ansible_collections/cisco/ise/plugins/modules/subscriber.py
new file mode 100644
index 000000000..e62fe2c55
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber.py
@@ -0,0 +1,150 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber
+short_description: Resource module for Subscriber
+description:
+- Manage operations create, update and delete of the resource Subscriber.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ enabled:
+ description: Subscriber is enabled or not.
+ type: bool
+ friendlyName:
+ description: Friendly name for the subscriber.
+ type: str
+ identityGroups:
+ description: Identity Group(s). With more than one idGroups it needs to be comma
+ seperated.
+ type: str
+ imeis:
+ description: IMEI to be attached to the subscriber.
+ type: str
+ imsi:
+ description: IMSI for Subscriber.
+ type: str
+ ki:
+ description: KI.
+ type: str
+ opc:
+ description: OPC.
+ type: str
+ subscriberId:
+ description: SubscriberId path parameter. Unique id for a subscriber object.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.create_subscriber,
+ subscriber.Subscriber.delete_subscriber,
+ subscriber.Subscriber.update_subscriber,
+
+ - Paths used are
+ post /api/v1/fiveg/subscriber,
+ delete /api/v1/fiveg/subscriber/{subscriberId},
+ put /api/v1/fiveg/subscriber/{subscriberId},
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enabled: true
+ friendlyName: string
+ identityGroups: string
+ imeis: string
+ imsi: string
+ ki: string
+ opc: string
+
+- name: Update by id
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: present
+ enabled: true
+ friendlyName: string
+ identityGroups: string
+ imeis: string
+ ki: string
+ opc: string
+ subscriberId: string
+
+- name: Delete by id
+ cisco.ise.subscriber:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ state: absent
+ subscriberId: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
+
+ise_update_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "response": {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ },
+ "version": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py
new file mode 100644
index 000000000..2b6547097
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py
@@ -0,0 +1,92 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber_bulk
+short_description: Resource module for Subscriber Bulk
+description:
+- Manage operation create of the resource Subscriber Bulk.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ ItemList:
+ description: Subscriber Bulk's ItemList.
+ elements: dict
+ suboptions:
+ enabled:
+ description: Subscriber is enabled or not.
+ type: bool
+ friendlyName:
+ description: Friendly name for the subscriber.
+ type: str
+ id:
+ description: Subscriber Bulk's id.
+ type: str
+ identityGroups:
+ description: Identity Group(s). With more than one idGroups it needs to be comma
+ seperated.
+ type: str
+ imeis:
+ description: Comma separated IMEIs to be attached to the subscriber.
+ type: str
+ imsi:
+ description: IMSI for Subscriber.
+ type: str
+ ki:
+ description: KI.
+ type: str
+ opc:
+ description: OPC.
+ type: str
+ type: list
+ operation:
+ description: Subscriber Bulk's operation.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.bulk_subscriber_operation,
+
+ - Paths used are
+ post /api/v1/fiveg/subscriber/bulk,
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.subscriber_bulk:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ ItemList:
+ - enabled: true
+ friendlyName: string
+ id: string
+ identityGroups: string
+ imeis: string
+ imsi: string
+ ki: string
+ opc: string
+ operation: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "id": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py
new file mode 100644
index 000000000..4da62a78f
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py
@@ -0,0 +1,69 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: subscriber_imsi_info
+short_description: Information module for Subscriber Imsi Info
+description:
+- Get Subscriber Imsi Info by id.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module_info
+author: Rafael Campos (@racampos)
+options:
+ imsi:
+ description:
+ - Imsi path parameter. IMSI parameter.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ subscriber.Subscriber.get_subscriber_by_i_m_s_i,
+
+ - Paths used are
+ get /api/v1/fiveg/subscriber/imsi/{imsi},
+
+"""
+
+EXAMPLES = r"""
+- name: Get Subscriber Imsi Info by id
+ cisco.ise.subscriber_imsi_info:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ imsi: string
+ register: result
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py
index 7c877bc3c..660937786 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py
@@ -6,14 +6,12 @@
DOCUMENTATION = r"""
---
-module: trustsec_vn_info
-short_description: Information module for Trustsec VN
+module: subscriber_info
+short_description: Information module for Subscriber
description:
-- Get all Trustsec VN.
-- Get Trustsec VN by id.
-- Get Virtual Network by id.
-- Get all Virtual Networks.
-version_added: '2.0.0'
+- Get all Subscriber.
+- Get Subscriber by id.
+version_added: '2.8.0'
extends_documentation_fragment:
- cisco.ise.module_info
author: Rafael Campos (@racampos)
@@ -26,14 +24,6 @@ options:
description:
- Size query parameter. Number of objects returned per page.
type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
filter:
description:
- >
@@ -52,58 +42,61 @@ options:
- The 'NENDSW' operator describes 'Not Ends With'.
- The 'CONTAINS' operator describes 'Contains'.
- The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
+ type: str
filterType:
description:
- >
FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
can be changed by using the parameter.
type: str
- id:
+ sort:
+ description:
+ - Sort query parameter. Sort type - asc or desc.
+ type: str
+ sortBy:
+ description:
+ - SortBy query parameter. Sort column by which objects needs to be sorted.
+ type: str
+ subscriberId:
description:
- - Id path parameter.
+ - SubscriberId path parameter. Unique id for a subscriber object.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.0.1
- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
notes:
- SDK Method used are
- virtual_network.VirtualNetwork.get_virtual_network_by_id,
- virtual_network.VirtualNetwork.get_virtual_networks_generator,
+ subscriber.Subscriber.get_all_subscribers_generator,
+ subscriber.Subscriber.get_subscriber_by_id,
- Paths used are
- get /api/v1/trustsec/virtualnetwork,
- get /api/v1/trustsec/virtualnetwork/{id},
+ get /api/v1/fiveg/subscriber,
+ get /api/v1/fiveg/subscriber/{subscriberId},
"""
EXAMPLES = r"""
-- name: Get all Trustsec VN
- cisco.ise.trustsec_vn_info:
+- name: Get all Subscriber
+ cisco.ise.subscriber_info:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
page: 0
size: 0
+ filter: string
+ filterType: string
sort: string
sortBy: string
- filter: []
- filterType: string
register: result
-- name: Get Trustsec VN by id
- cisco.ise.trustsec_vn_info:
+- name: Get Subscriber by id
+ cisco.ise.subscriber_info:
ise_hostname: "{{ise_hostname}}"
ise_username: "{{ise_username}}"
ise_password: "{{ise_password}}"
ise_verify: "{{ise_verify}}"
- id: string
+ subscriberId: string
register: result
"""
@@ -112,17 +105,25 @@ RETURN = r"""
ise_response:
description: A dictionary or list with the response returned by the Cisco ISE Python SDK
returned: always
- type: list
- elements: dict
+ type: dict
sample: >
- [
- {
- "additionalAttributes": "string",
- "id": "string",
- "lastUpdate": "string",
- "name": "string"
- }
- ]
+ {
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
+ "id": "string",
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
+ }
ise_responses:
description: A dictionary or list with the response returned by the Cisco ISE Python SDK
@@ -132,10 +133,21 @@ ise_responses:
sample: >
[
{
- "additionalAttributes": "string",
+ "createTime": "string",
+ "enabled": true,
+ "friendlyName": "string",
"id": "string",
- "lastUpdate": "string",
- "name": "string"
+ "identityGroups": "string",
+ "imeis": "string",
+ "imsi": "string",
+ "ki": "string",
+ "link": {
+ "href": "string",
+ "rel": "string",
+ "type": "string"
+ },
+ "opc": "string",
+ "updateTime": "string"
}
]
"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
index 81aaf5bf6..cd29a5b31 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py
@@ -57,7 +57,7 @@ options:
type: str
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for SupportBundleTriggerConfiguration
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
index c6b8b4635..952d9fcf3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py
@@ -29,7 +29,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
index 0cdb8aaf9..67fd177d2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py
@@ -31,7 +31,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
index 544a65b80..53a6ec262 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py
@@ -46,7 +46,7 @@ options:
description: SXP Connections's sxpVpn.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
index bfa5183c0..dfcbb8eb2 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
index 02ca9ce03..3e62f2782 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP Connections Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
index 08a50da5f..42e979779 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
index 5eff2ab4e..a403670fd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py
@@ -42,7 +42,7 @@ options:
or vns should be defined.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
index 3cb621af3..f34f4741c 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
index 374def105..66b5e0ab1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP Local Bindings Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
index 0c422a495..15aeaf5e3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py
@@ -65,7 +65,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
index 0b7a88dce..abab51624 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py
@@ -24,7 +24,7 @@ options:
description: SXP VPNs's sxpVpnName.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
index 9ec5a6fbc..d749941ab 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py
@@ -21,7 +21,7 @@ options:
- Bulkid path parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
index 0c8e957c6..0d24fbc94 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py
@@ -23,7 +23,7 @@ options:
description: SXP VPNs Bulk Request's resourceMediaType.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
index 0b233c134..4fffbfc4a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py
@@ -65,7 +65,7 @@ options:
- Sortdsc query parameter. Sort desc.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
index 6022b8d32..f2dd7a73b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py
@@ -78,7 +78,7 @@ options:
description: Use certificate for SAML Signing.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
index 758318611..916142bb3 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py
@@ -88,7 +88,7 @@ options:
description: NodeId of Cisco ISE application.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
index 793eaea33..e53c17a3a 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py
@@ -35,7 +35,7 @@ options:
description: Enable or disable automatic file creation of raw response.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
index 9cb9d3301..72f69d078 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py
@@ -81,7 +81,7 @@ options:
description: Validate certificate extensions.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
index 9c05839cb..7d90d10d4 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py
@@ -69,7 +69,7 @@ options:
- Id path parameter. ID of the system certificate.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
index cbff1e720..2213574f0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for VersionAndPatch
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
index 461d03bda..af3075c13 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py
@@ -49,7 +49,7 @@ options:
description: PermitUnmatched flag.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
index 59398596d..4aa4f9be9 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
index 51d311bf0..2d724e764 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py
@@ -43,7 +43,7 @@ options:
description: The server timeout.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
index 5759de015..d097fcf25 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
index 8cb53b9be..304caaabd 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py
@@ -46,7 +46,7 @@ options:
type: list
type: dict
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
index a64d0f257..59f1495f6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
index 0f9669f0f..e26adf0ae 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py
@@ -50,7 +50,7 @@ options:
description: Define if a delimiter will be used for suffix strip.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
index 618b4c59f..69d4424b0 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py
@@ -37,7 +37,7 @@ options:
- Size query parameter. Number of objects returned per page.
type: int
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
notes:
- SDK Method used are
diff --git a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
index 98dabd3dc..b038c6e9d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py
@@ -21,7 +21,7 @@ options:
- TaskId path parameter. The id of the task executed before.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for tasks
diff --git a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
index 4393577aa..089d885d1 100644
--- a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py
@@ -57,7 +57,7 @@ options:
can be changed by using the parameter.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for TelemetryInformation
diff --git a/ansible_collections/cisco/ise/plugins/modules/test_connector.py b/ansible_collections/cisco/ise/plugins/modules/test_connector.py
new file mode 100644
index 000000000..4caaadc4b
--- /dev/null
+++ b/ansible_collections/cisco/ise/plugins/modules/test_connector.py
@@ -0,0 +1,87 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2021, Cisco Systems
+# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
+
+DOCUMENTATION = r"""
+---
+module: test_connector
+short_description: Resource module for Test Connector
+description:
+- Manage operation create of the resource Test Connector.
+- EDDA - test the Connector.
+version_added: '2.8.0'
+extends_documentation_fragment:
+ - cisco.ise.module
+author: Rafael Campos (@racampos)
+options:
+ authType:
+ description: Authentication Type list.
+ type: str
+ authValues:
+ description: Request to test Connector.
+ suboptions:
+ password:
+ description: Password.
+ type: str
+ userName:
+ description: UserName.
+ type: str
+ type: dict
+ connectorName:
+ description: ConnectorName.
+ type: str
+ responseParsing:
+ description: Uniqueness to identify.
+ type: str
+ uniqueID:
+ description: Uniqueness to identify.
+ type: str
+ url:
+ description: BulkUrl.
+ type: str
+requirements:
+- ciscoisesdk >= 2.0.1
+- python >= 3.5
+notes:
+ - SDK Method used are
+ edda.Edda.test_connector,
+
+ - Paths used are
+ post /api/v1/edda/test-connector,
+
+"""
+
+EXAMPLES = r"""
+- name: Create
+ cisco.ise.test_connector:
+ ise_hostname: "{{ise_hostname}}"
+ ise_username: "{{ise_username}}"
+ ise_password: "{{ise_password}}"
+ ise_verify: "{{ise_verify}}"
+ authType: string
+ authValues:
+ password: string
+ userName: string
+ connectorName: string
+ responseParsing: string
+ uniqueID: string
+ url: string
+
+"""
+
+RETURN = r"""
+ise_response:
+ description: A dictionary or list with the response returned by the Cisco ISE Python SDK
+ returned: always
+ type: dict
+ sample: >
+ {
+ "connectorName": "string",
+ "data": "string",
+ "error": "string",
+ "status": "string",
+ "uniqueID": "string"
+ }
+"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
index 853c23ade..6288b13c6 100644
--- a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
+++ b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py
@@ -20,7 +20,7 @@ options:
description: Threat Vulnerabilities Clear's macAddresses.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for ClearThreatsAndVulnerabilities
diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
index 1db63b6e8..9b7012f3b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
+++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py
@@ -23,7 +23,7 @@ options:
description: URL of transport gateway.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for telemetry
diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
index a5f69c026..404d01827 100644
--- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py
@@ -17,7 +17,7 @@ extends_documentation_fragment:
author: Rafael Campos (@racampos)
options: {}
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for telemetry
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
index d93fd1dee..abe3948a5 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py
@@ -91,7 +91,7 @@ options:
description: Trust for authentication within Cisco ISE.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
index 7912ff872..640dffb3b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py
@@ -10,7 +10,7 @@ module: trusted_certificate_export_info
short_description: Information module for Trusted Certificate Export
description:
- Get Trusted Certificate Export by id.
-- The response of this API carries a trusted certificate file mapped to the.
+- The response of this API carries a trusted certificate file mapped to the requested ID.
version_added: '1.0.0'
extends_documentation_fragment:
- cisco.ise.module_info
@@ -33,7 +33,7 @@ options:
- The filename used to save the download file.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
index 795ddb27c..a03c7d41d 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py
@@ -50,7 +50,7 @@ options:
description: Validate trust certificate extension.
type: bool
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
index fceb4f0ca..198e0539b 100644
--- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
+++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py
@@ -65,7 +65,7 @@ options:
- Id path parameter. ID of the trust certificate.
type: str
requirements:
-- ciscoisesdk >= 2.0.8
+- ciscoisesdk >= 2.1.1
- python >= 3.5
seealso:
- name: Cisco ISE documentation for Certificates
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py
deleted file mode 100644
index d82685f21..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_nbar_app
-short_description: Resource module for Trustsec NBAR App
-description:
-- Manage operations create, update and delete of the resource Trustsec NBAR App.
-- Create NBAR application.
-- Update NBAR Application.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- description:
- description: Trustsec NBAR App's description.
- type: str
- id:
- description: Trustsec NBAR App's id.
- type: str
- name:
- description: Trustsec NBAR App's name.
- type: str
- networkIdentities:
- description: Array of NIs.
- elements: dict
- suboptions:
- ports:
- description: Trustsec NBAR App's ports.
- type: str
- protocol:
- description: Trustsec NBAR App's protocol.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for nbarApp
- description: Complete reference of the nbarApp API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- nbar_app.NbarApp.create_nbar_app,
- nbar_app.NbarApp.delete_nbar_app_by_id,
- nbar_app.NbarApp.update_nbar_app_by_id,
-
- - Paths used are
- post /api/v1/trustsec/sgacl/nbarapp,
- delete /api/v1/trustsec/sgacl/nbarapp/{id},
- put /api/v1/trustsec/sgacl/nbarapp/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- description: string
- id: string
- name: string
- networkIdentities:
- - ports: string
- protocol: string
-
-- name: Update by id
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- description: string
- id: string
- name: string
- networkIdentities:
- - ports: string
- protocol: string
-
-- name: Delete by id
- cisco.ise.trustsec_nbar_app:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py
deleted file mode 100644
index 9c2b732b9..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py
+++ /dev/null
@@ -1,151 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_nbar_app_info
-short_description: Information module for Trustsec NBAR App
-description:
-- Get all Trustsec NBAR App.
-- Get Trustsec NBAR App by id.
-- Get NBAR Application by id.
-- Get all NBAR Applications.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for nbarApp
- description: Complete reference of the nbarApp API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- nbar_app.NbarApp.get_nbar_app_by_id,
- nbar_app.NbarApp.get_nbar_apps_generator,
-
- - Paths used are
- get /api/v1/trustsec/sgacl/nbarapp,
- get /api/v1/trustsec/sgacl/nbarapp/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec NBAR App
- cisco.ise.trustsec_nbar_app_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec NBAR App by id
- cisco.ise.trustsec_nbar_app_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "description": "string",
- "id": "string",
- "name": "string",
- "networkIdentities": [
- {
- "ports": "string",
- "protocol": "string"
- }
- ]
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py
deleted file mode 100644
index b9c65804b..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping
-short_description: Resource module for Trustsec SG VN Mapping
-description:
-- Manage operations create, update and delete of the resource Trustsec SG VN Mapping.
-- Create Security Group and Virtual Network mapping.
-- Delete Security Group and Virtual Network mapping.
-- Update Security Group and Virtual Network mapping.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if id
- is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required unless
- its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity if id
- is not provided.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.create_sg_vn_mapping,
- sg_vn_mapping.SgVnMapping.delete_sg_vn_mapping_by_id,
- sg_vn_mapping.SgVnMapping.update_sg_vn_mapping_by_id,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping,
- delete /api/v1/trustsec/sgvnmapping/{id},
- put /api/v1/trustsec/sgvnmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-- name: Update by id
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-- name: Delete by id
- cisco.ise.trustsec_sg_vn_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py
deleted file mode 100644
index 2adb8f02a..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_create
-short_description: Resource module for Trustsec SG VN Mapping Bulk Create
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Create's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if
- id is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_create_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py
deleted file mode 100644
index b5d8b48de..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py
+++ /dev/null
@@ -1,59 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_delete
-short_description: Resource module for Trustsec SG VN Mapping Bulk Delete
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Delete.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Delete's payload.
- elements: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_delete_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/delete,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_delete:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py
deleted file mode 100644
index 05b1a97e3..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_bulk_update
-short_description: Resource module for Trustsec SG VN Mapping Bulk Update
-description:
-- Manage operation create of the resource Trustsec SG VN Mapping Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec SG VN Mapping Bulk Update's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the SG-VN mapping.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the SG-VN mapping.
- type: str
- sgName:
- description: Name of the associated Security Group to be used for identity if
- id is not provided.
- type: str
- sgtId:
- description: Identifier of the associated Security Group which is required unless
- its name is provided.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.bulk_update_sg_vn_mappings,
-
- - Paths used are
- post /api/v1/trustsec/sgvnmapping/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_sg_vn_mapping_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- lastUpdate: string
- sgName: string
- sgtId: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py
deleted file mode 100644
index 3ac8cb0c9..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py
+++ /dev/null
@@ -1,145 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_sg_vn_mapping_info
-short_description: Information module for Trustsec SG VN Mapping
-description:
-- Get all Trustsec SG VN Mapping.
-- Get Trustsec SG VN Mapping by id.
-- Get Security Group and Virtual Network mapping by id.
-- Get all Security Group and Virtual Network mappings.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for sgVnMapping
- description: Complete reference of the sgVnMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- sg_vn_mapping.SgVnMapping.get_sg_vn_mapping_by_id,
- sg_vn_mapping.SgVnMapping.get_sg_vn_mappings_generator,
-
- - Paths used are
- get /api/v1/trustsec/sgvnmapping,
- get /api/v1/trustsec/sgvnmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec SG VN Mapping
- cisco.ise.trustsec_sg_vn_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec SG VN Mapping by id
- cisco.ise.trustsec_sg_vn_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "lastUpdate": "string",
- "sgName": "string",
- "sgtId": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py
deleted file mode 100644
index 7bd274ee2..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py
+++ /dev/null
@@ -1,113 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn
-short_description: Resource module for Trustsec VN
-description:
-- Manage operations create, update and delete of the resource Trustsec VN.
-- Create Virtual Network.
-- Update Virtual Network.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.create_virtual_network,
- virtual_network.VirtualNetwork.delete_virtual_network_by_id,
- virtual_network.VirtualNetwork.update_virtual_network_by_id,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork,
- delete /api/v1/trustsec/virtualnetwork/{id},
- put /api/v1/trustsec/virtualnetwork/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-- name: Update by id
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-- name: Delete by id
- cisco.ise.trustsec_vn:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "additionalAttributes": "string",
- "id": "string",
- "lastUpdate": "string",
- "name": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py
deleted file mode 100644
index 3893db42a..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py
+++ /dev/null
@@ -1,75 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_bulk_create
-short_description: Resource module for Trustsec VN Bulk Create
-description:
-- Manage operation create of the resource Trustsec VN Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN Bulk Create's payload.
- elements: dict
- suboptions:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.bulk_create_virtual_networks,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py
deleted file mode 100644
index c823d303c..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py
+++ /dev/null
@@ -1,75 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_bulk_update
-short_description: Resource module for Trustsec VN Bulk Update
-description:
-- Manage operation create of the resource Trustsec VN Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN Bulk Update's payload.
- elements: dict
- suboptions:
- additionalAttributes:
- description: JSON String of additional attributes for the Virtual Network.
- type: str
- id:
- description: Identifier of the Virtual Network.
- type: str
- lastUpdate:
- description: Timestamp for the last update of the Virtual Network.
- type: str
- name:
- description: Name of the Virtual Network.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for virtualNetwork
- description: Complete reference of the virtualNetwork API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- virtual_network.VirtualNetwork.bulk_update_virtual_networks,
-
- - Paths used are
- post /api/v1/trustsec/virtualnetwork/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - additionalAttributes: string
- id: string
- lastUpdate: string
- name: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py
deleted file mode 100644
index 712c562be..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py
+++ /dev/null
@@ -1,139 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping
-short_description: Resource module for Trustsec VN VLAN Mapping
-description:
-- Manage operations create, update and delete of the resource Trustsec VN VLAN Mapping.
-- Create VN-Vlan Mapping.
-- Update VN-Vlan Mapping.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required unless
- its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity if id
- is not provided.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.create_vn_vlan_mapping,
- vn_vlan_mapping.VnVlanMapping.delete_vn_vlan_mapping_by_id,
- vn_vlan_mapping.VnVlanMapping.update_vn_vlan_mapping_by_id,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping,
- delete /api/v1/trustsec/vnvlanmapping/{id},
- put /api/v1/trustsec/vnvlanmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-- name: Update by id
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: present
- id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-- name: Delete by id
- cisco.ise.trustsec_vn_vlan_mapping:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- state: absent
- id: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_update_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "code": 0,
- "message": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py
deleted file mode 100644
index bbe8e5980..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py
+++ /dev/null
@@ -1,93 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_create
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Create
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Create.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Create's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_create_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/create,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_create:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py
deleted file mode 100644
index 88a6c1e34..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py
+++ /dev/null
@@ -1,59 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_delete
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Delete
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Delete.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Delete's payload.
- elements: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_delete_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/delete,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_delete:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py
deleted file mode 100644
index e99b6f6d5..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py
+++ /dev/null
@@ -1,93 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_bulk_update
-short_description: Resource module for Trustsec VN VLAN Mapping Bulk Update
-description:
-- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Update.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module
-author: Rafael Campos (@racampos)
-options:
- payload:
- description: Trustsec VN VLAN Mapping Bulk Update's payload.
- elements: dict
- suboptions:
- id:
- description: Identifier of the VN-VLAN Mapping.
- type: str
- isData:
- description: Flag which indicates whether the VLAN is data or voice type.
- type: bool
- isDefaultVLAN:
- description: Flag which indicates if the VLAN is default.
- type: bool
- lastUpdate:
- description: Timestamp for the last update of the VN-VLAN Mapping.
- type: str
- maxValue:
- description: Max value.
- type: int
- name:
- description: Name of the VLAN.
- type: str
- vnId:
- description: Identifier for the associated Virtual Network which is required
- unless its name is provided.
- type: str
- vnName:
- description: Name of the associated Virtual Network to be used for identity
- if id is not provided.
- type: str
- type: list
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.bulk_update_vn_vlan_mappings,
-
- - Paths used are
- post /api/v1/trustsec/vnvlanmapping/bulk/update,
-
-"""
-
-EXAMPLES = r"""
-- name: Create
- cisco.ise.trustsec_vn_vlan_mapping_bulk_update:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- payload:
- - id: string
- isData: true
- isDefaultVlan: true
- lastUpdate: string
- maxValue: 0
- name: string
- vnId: string
- vnName: string
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: dict
- sample: >
- {
- "id": "string"
- }
-"""
diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py
deleted file mode 100644
index c6047e4ee..000000000
--- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py
+++ /dev/null
@@ -1,149 +0,0 @@
-#!/usr/bin/python
-# -*- coding: utf-8 -*-
-
-# Copyright (c) 2021, Cisco Systems
-# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)
-
-DOCUMENTATION = r"""
----
-module: trustsec_vn_vlan_mapping_info
-short_description: Information module for Trustsec VN VLAN Mapping
-description:
-- Get all Trustsec VN VLAN Mapping.
-- Get Trustsec VN VLAN Mapping by id.
-- Get VN-Vlan Mapping by id.
-- Get all VN-Vlan Mappings.
-version_added: '2.0.0'
-extends_documentation_fragment:
- - cisco.ise.module_info
-author: Rafael Campos (@racampos)
-options:
- page:
- description:
- - Page query parameter. Page number.
- type: int
- size:
- description:
- - Size query parameter. Number of objects returned per page.
- type: int
- sort:
- description:
- - Sort query parameter. Sort type - asc or desc.
- type: str
- sortBy:
- description:
- - SortBy query parameter. Sort column by which objects needs to be sorted.
- type: str
- filter:
- description:
- - >
- Filter query parameter. .. Container **Simple filtering** should be available through the filter query
- string parameter. The structure of a filter is a triplet of field operator and value separated with dots.
- More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND,
- and can be changed by using the *"filterType=or"* query string parameter.
- - Each resource Data model description should specify if an attribute is a filtered field.
- - The 'EQ' operator describes 'Equals'.
- - The 'NEQ' operator describes 'Not Equals'.
- - The 'GT' operator describes 'Greater Than'.
- - The 'LT' operator describes 'Less Than'.
- - The 'STARTSW' operator describes 'Starts With'.
- - The 'NSTARTSW' operator describes 'Not Starts With'.
- - The 'ENDSW' operator describes 'Ends With'.
- - The 'NENDSW' operator describes 'Not Ends With'.
- - The 'CONTAINS' operator describes 'Contains'.
- - The 'NCONTAINS' operator describes 'Not Contains'.
- elements: str
- type: list
- filterType:
- description:
- - >
- FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and
- can be changed by using the parameter.
- type: str
- id:
- description:
- - Id path parameter.
- type: str
-requirements:
-- ciscoisesdk >= 2.0.8
-- python >= 3.5
-seealso:
-- name: Cisco ISE documentation for vnVlanMapping
- description: Complete reference of the vnVlanMapping API.
- link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi
-notes:
- - SDK Method used are
- vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mapping_by_id,
- vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mappings_generator,
-
- - Paths used are
- get /api/v1/trustsec/vnvlanmapping,
- get /api/v1/trustsec/vnvlanmapping/{id},
-
-"""
-
-EXAMPLES = r"""
-- name: Get all Trustsec VN VLAN Mapping
- cisco.ise.trustsec_vn_vlan_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- page: 0
- size: 0
- sort: string
- sortBy: string
- filter: []
- filterType: string
- register: result
-
-- name: Get Trustsec VN VLAN Mapping by id
- cisco.ise.trustsec_vn_vlan_mapping_info:
- ise_hostname: "{{ise_hostname}}"
- ise_username: "{{ise_username}}"
- ise_password: "{{ise_password}}"
- ise_verify: "{{ise_verify}}"
- id: string
- register: result
-
-"""
-
-RETURN = r"""
-ise_response:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-
-ise_responses:
- description: A dictionary or list with the response returned by the Cisco ISE Python SDK
- returned: always
- type: list
- elements: dict
- sample: >
- [
- {
- "id": "string",
- "isData": true,
- "isDefaultVlan": true,
- "lastUpdate": "string",
- "maxValue": 0,
- "name": "string",
- "vnId": "string",
- "vnName": "string"
- }
- ]
-"""
diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
index 2a2dce924..fbb0843c2 100644
--- a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
+++ b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py
@@ -13,7 +13,7 @@ except ImportError:
ISE_SDK_IS_INSTALLED = False
else:
ISE_SDK_IS_INSTALLED = True
-from ansible.module_utils.basic import AnsibleModule, env_fallback
+from ansible.module_utils.basic import env_fallback
try:
from ansible.errors import AnsibleActionFail
@@ -133,11 +133,12 @@ def ise_argument_spec():
ise_username=dict(type="str", fallback=(env_fallback, ['ISE_USERNAME']), required=True),
ise_password=dict(type="str", fallback=(env_fallback, ['ISE_PASSWORD']), required=True, no_log=True),
ise_verify=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_VERIFY'])),
- ise_version=dict(type="str", default="3.1_Patch_1", fallback=(env_fallback, ['ISE_VERSION'])),
+ ise_version=dict(type="str", default="3.2_beta", fallback=(env_fallback, ['ISE_VERSION'])),
ise_wait_on_rate_limit=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_WAIT_ON_RATE_LIMIT'])),
ise_uses_api_gateway=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_USES_API_GATEWAY'])),
ise_uses_csrf_token=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_USES_CSRF_TOKEN'])),
ise_debug=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_DEBUG'])),
+ ise_single_request_timeout=dict(type="int", default=60, fallback=(env_fallback, ['ISE_SINGLE_REQUEST_TIMEOUT'])),
)
return argument_spec
@@ -172,6 +173,7 @@ class ISESDK(object):
ers_base_url=ers_base_url,
mnt_base_url=mnt_base_url,
px_grid_base_url=px_grid_base_url,
+ single_request_timeout=params.get("ise_single_request_timeout"),
verify=params.get("ise_verify"),
version=params.get("ise_version"),
wait_on_rate_limit=params.get("ise_wait_on_rate_limit"),
diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
index 1f30a10c7..6fb4e2744 100644
--- a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
+++ b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py
@@ -144,7 +144,7 @@ class Node(object):
try:
response = requests.post(url=url, timeout=15, data=data, headers=headers, auth=(self.username, self.password), verify=False)
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if not response.status_code == 200:
raise AnsibleActionFail("Received status code {status_code} when exporting certificate.".format(status_code=str(response.status_code)))
@@ -175,7 +175,7 @@ class Node(object):
)
return_message = json.loads(response.text)["response"]["message"]
except Exception as e:
- AnsibleActionFail(e)
+ raise AnsibleActionFail(e)
if not response.status_code == 200:
if not (return_message == 'Trust certificate was added successfully' or
diff --git a/ansible_collections/cisco/ise/requirements.txt b/ansible_collections/cisco/ise/requirements.txt
index 2fdf7846e..010de3983 100644
--- a/ansible_collections/cisco/ise/requirements.txt
+++ b/ansible_collections/cisco/ise/requirements.txt
@@ -1,2 +1,2 @@
-ciscoisesdk >= 2.0.8
+ciscoisesdk >= 2.1.1
requests >= 2.25.1
diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt
index 2482cbb3f..944c6f3e9 100644
--- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt
+++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt
@@ -366,23 +366,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
@@ -749,20 +747,18 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file
+plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt
index 0b0a4e409..52fcd2e86 100644
--- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt
+++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt
@@ -1,5 +1,20 @@
plugins/plugin_utils/ise.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/plugin_utils/ise.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/plugin_utils/ise.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_bindings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/aci_settings.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
@@ -367,23 +382,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
@@ -750,23 +763,6 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_bindings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
@@ -1133,20 +1129,18 @@ plugins/action/trusted_certificate.py import-2.7 # Python 2.7 is not supported b
plugins/action/trusted_certificate_export_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file
+plugins/action/connector_config_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file
diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt
new file mode 100644
index 000000000..e69de29bb
--- /dev/null
+++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt
diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt
index 2482cbb3f..944c6f3e9 100644
--- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt
+++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt
@@ -366,23 +366,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK
plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
@@ -749,20 +747,18 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo
plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
-plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file
+plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
+plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK \ No newline at end of file