diff options
Diffstat (limited to 'ansible_collections/cisco/ise/plugins')
449 files changed, 3029 insertions, 3844 deletions
diff --git a/ansible_collections/cisco/ise/plugins/.DS_Store b/ansible_collections/cisco/ise/plugins/.DS_Store Binary files differnew file mode 100644 index 000000000..874d3d2c6 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/.DS_Store diff --git a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py index c303d3b77..76f1adff1 100644 --- a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py +++ b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py @@ -80,15 +80,12 @@ class ActionModule(ActionBase): self._result.update(dict(ise_response={})) ise = ISESDK(params=self._task.args) + response = ise.exec( + family="active_directory", + function='get_groups_by_domain', + params=self.get_object(self._task.args) + ).response['ERSActiveDirectoryGroups'] - id = self._task.args.get("id") - name = self._task.args.get("name") - if not name and not id: - response = ise.exec( - family="active_directory", - function='get_groups_by_domain', - params=self.get_object(self._task.args) - ).response['ERSActiveDirectoryGroups'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/action/configuration.py index b137aa8cc..de3fe1eff 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py +++ b/ansible_collections/cisco/ise/plugins/action/configuration.py @@ -32,97 +32,46 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - state=dict(type="str", default="present", choices=["present", "absent"]), - id=dict(type="str"), - isData=dict(type="bool"), - isDefaultVlan=dict(type="bool"), - lastUpdate=dict(type="str"), - maxValue=dict(type="int"), - name=dict(type="str"), - vnId=dict(type="str"), - vnName=dict(type="str"), + state=dict(type="str", default="present", choices=["present"]), + enableEPO=dict(type="bool"), + enableRCM=dict(type="bool"), )) required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), + ("state", "present", [], True), ] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecVnVlanMapping(object): +class Configuration(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( - id=params.get("id"), - is_data=params.get("isData"), - is_default_vlan=params.get("isDefaultVlan"), - last_update=params.get("lastUpdate"), - max_value=params.get("maxValue"), - name=params.get("name"), - vn_id=params.get("vnId"), - vn_name=params.get("vnName"), + enable_epo=params.get("enableEPO"), + enable_rcm=params.get("enableRCM"), ) def get_object_by_name(self, name): - # NOTICE: Get does not support/work for filter by name with EQ + # NOTICE: Does not have a get by name method or it is in another action result = None - gen_items_responses = self.ise.exec( - family="vn_vlan_mapping", - function="get_vn_vlan_mappings_generator", - params={"filter": "name.EQ.{name}".format(name=name)} - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - result = get_dict_result(items, 'name', name) - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result + items = self.ise.exec( + family="configuration", + function="get_configuration" + ).response + result = get_dict_result(items, 'name', name) return result def get_object_by_id(self, id): - try: - result = self.ise.exec( - family="vn_vlan_mapping", - function="get_vn_vlan_mapping_by_id", - handle_func_exception=False, - params={"id": id} - ).response['response'] - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - if isinstance(result, list) and len(result) > 0: - return result[0] + # NOTICE: Does not have a get by id method or it is in another action + result = None return result def exists(self): + prev_obj = None id_exists = False name_exists = False - prev_obj = None o_id = self.new_object.get("id") name = self.new_object.get("name") if o_id: @@ -135,8 +84,6 @@ class TrustsecVnVlanMapping(object): _id = prev_obj.get("id") if id_exists and name_exists and o_id != _id: raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) it_exists = prev_obj is not None and isinstance(prev_obj, dict) return (it_exists, prev_obj) @@ -144,14 +91,8 @@ class TrustsecVnVlanMapping(object): requested_obj = self.new_object obj_params = [ - ("id", "id"), - ("isData", "is_data"), - ("isDefaultVlan", "is_default_vlan"), - ("lastUpdate", "last_update"), - ("maxValue", "max_value"), - ("name", "name"), - ("vnId", "vn_id"), - ("vnName", "vn_name"), + ("enableEPO", "enable_epo"), + ("enableRCM", "enable_rcm"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -159,38 +100,13 @@ class TrustsecVnVlanMapping(object): requested_obj.get(ansible_param)) for (ise_param, ansible_param) in obj_params) - def create(self): - result = self.ise.exec( - family="vn_vlan_mapping", - function="create_vn_vlan_mapping", - params=self.new_object, - ).response - return result - def update(self): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="vn_vlan_mapping", - function="update_vn_vlan_mapping_by_id", - params=self.new_object - ).response - return result - - def delete(self): - id = self.new_object.get("id") - name = self.new_object.get("name") - result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="vn_vlan_mapping", - function="delete_vn_vlan_mapping_by_id", + family="configuration", + function="update_configuration", params=self.new_object ).response return result @@ -230,12 +146,11 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecVnVlanMapping(self._task.args, ise) + obj = Configuration(self._task.args, ise) state = self._task.args.get("state") response = None - if state == "present": (obj_exists, prev_obj) = obj.exists() if obj_exists: @@ -249,19 +164,7 @@ class ActionModule(ActionBase): response = prev_obj ise.object_already_present() else: - ise_create_response = obj.create() - (obj_exists, created_obj) = obj.exists() - response = created_obj - ise.object_created() - - elif state == "absent": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - obj.delete() - response = prev_obj - ise.object_deleted() - else: - ise.object_already_absent() + ise.fail_json("Object does not exists, plugin only has update") self._result.update(dict(ise_response=response)) self._result.update(ise.exit_json()) diff --git a/ansible_collections/cisco/ise/plugins/action/configuration_info.py b/ansible_collections/cisco/ise/plugins/action/configuration_info.py new file mode 100644 index 000000000..d3ed0d5fe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/configuration_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="configuration", + function='get_configuration', + params=self.get_object(self._task.args) + ).response + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/action/connector_config.py index ff1dd8fd7..8e124b7ed 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py +++ b/ansible_collections/cisco/ise/plugins/action/connector_config.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -33,68 +33,54 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), - additionalAttributes=dict(type="str"), - id=dict(type="str"), - lastUpdate=dict(type="str"), - name=dict(type="str"), + additionalProperties=dict(type="dict"), + attributes=dict(type="dict"), + connectorName=dict(type="str"), + connectorType=dict(type="str"), + deltasyncSchedule=dict(type="dict"), + description=dict(type="str"), + enabled=dict(type="bool"), + fullsyncSchedule=dict(type="dict"), + protocol=dict(type="str"), + skipCertificateValidations=dict(type="bool"), + url=dict(type="dict"), )) required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), + ("state", "present", ["connectorName"], True), + ("state", "absent", ["connectorName"], True), ] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecVn(object): +class ConnectorConfig(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( - additional_attributes=params.get("additionalAttributes"), - id=params.get("id"), - last_update=params.get("lastUpdate"), - name=params.get("name"), + additional_properties=params.get("additionalProperties"), + attributes=params.get("attributes"), + connector_name=params.get("connectorName"), + connector_type=params.get("connectorType"), + deltasync_schedule=params.get("deltasyncSchedule"), + description=params.get("description"), + enabled=params.get("enabled"), + fullsync_schedule=params.get("fullsyncSchedule"), + protocol=params.get("protocol"), + skip_certificate_validations=params.get("skipCertificateValidations"), + url=params.get("url"), ) def get_object_by_name(self, name): - # NOTICE: Get does not support/work for filter by name with EQ - result = None - gen_items_responses = self.ise.exec( - family="virtual_network", - function="get_virtual_networks_generator", - params={"filter": "name.EQ.{name}".format(name=name)} - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - result = get_dict_result(items, 'name', name) - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result - return result - - def get_object_by_id(self, id): try: result = self.ise.exec( - family="virtual_network", - function="get_virtual_network_by_id", + family="edda", + function="get_connector_config_by_connector_name", + params={"connector_name": name}, handle_func_exception=False, - params={"id": id} ).response['response'] + result = get_dict_result(result, 'connectorName', name) except (TypeError, AttributeError) as e: self.ise.fail_json( msg=( @@ -107,8 +93,11 @@ class TrustsecVn(object): ) except Exception: result = None - if isinstance(result, list) and len(result) > 0: - return result[0] + return result + + def get_object_by_id(self, id): + # NOTICE: Does not have a get by id method or it is in another action + result = None return result def exists(self): @@ -116,7 +105,7 @@ class TrustsecVn(object): name_exists = False prev_obj = None o_id = self.new_object.get("id") - name = self.new_object.get("name") + name = self.new_object.get("connectorName") if o_id: prev_obj = self.get_object_by_id(o_id) id_exists = prev_obj is not None and isinstance(prev_obj, dict) @@ -127,8 +116,6 @@ class TrustsecVn(object): _id = prev_obj.get("id") if id_exists and name_exists and o_id != _id: raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) it_exists = prev_obj is not None and isinstance(prev_obj, dict) return (it_exists, prev_obj) @@ -136,10 +123,17 @@ class TrustsecVn(object): requested_obj = self.new_object obj_params = [ - ("additionalAttributes", "additional_attributes"), - ("id", "id"), - ("lastUpdate", "last_update"), - ("name", "name"), + ("additionalProperties", "additional_properties"), + ("attributes", "attributes"), + ("connectorName", "connector_name"), + ("connectorType", "connector_type"), + ("deltasyncSchedule", "deltasync_schedule"), + ("description", "description"), + ("enabled", "enabled"), + ("fullsyncSchedule", "fullsync_schedule"), + ("protocol", "protocol"), + ("skipCertificateValidations", "skip_certificate_validations"), + ("url", "url"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -149,8 +143,8 @@ class TrustsecVn(object): def create(self): result = self.ise.exec( - family="virtual_network", - function="create_virtual_network", + family="edda", + function="create_connector_config", params=self.new_object, ).response return result @@ -159,12 +153,12 @@ class TrustsecVn(object): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) + if not name: + name_ = self.get_object_by_id(id).get("name") + self.new_object.update(dict(name=name_)) result = self.ise.exec( - family="virtual_network", - function="update_virtual_network_by_id", + family="edda", + function="update_connector_config_by_connector_name", params=self.new_object ).response return result @@ -173,12 +167,12 @@ class TrustsecVn(object): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) + if not name: + name_ = self.get_object_by_id(id).get("name") + self.new_object.update(dict(name=name_)) result = self.ise.exec( - family="virtual_network", - function="delete_virtual_network_by_id", + family="edda", + function="delete_connector_config_by_connector_name", params=self.new_object ).response return result @@ -218,7 +212,7 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecVn(self._task.args, ise) + obj = ConnectorConfig(self._task.args, ise) state = self._task.args.get("state") diff --git a/ansible_collections/cisco/ise/plugins/action/connector_config_info.py b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py new file mode 100644 index 000000000..05bd40cbe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py @@ -0,0 +1,101 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + connectorName=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + connector_name=params.get("connectorName"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("connectorName") + if name: + response = ise.exec( + family="edda", + function='get_connector_config_by_connector_name', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result + if not name and not id: + response = ise.exec( + family="edda", + function='get_connector_config', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py new file mode 100644 index 000000000..ffd19d387 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="dataconnect_services", + function='get_odbc_detail', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py new file mode 100644 index 000000000..5d794c926 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="dataconnect_services", + function='get_dataconnect_service', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py index 95943d628..0fd96ad3e 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + password=dict(type="str", no_log=True), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + password=params.get("password"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="virtual_network", - function="bulk_create_virtual_networks", + family="dataconnect_services", + function="update_dataconnect_password", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py index f84f91108..f9db60ec8 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + passwordExpiresInDays=dict(type="int"), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + password_expires_in_days=params.get("passwordExpiresInDays"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_update_sg_vn_mappings", + family="dataconnect_services", + function="update_dataconnect_password_expiry", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py index ab7effb63..e7232ab0e 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + isEnabled=dict(type="bool"), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + is_enabled=params.get("isEnabled"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_delete_sg_vn_mappings", + family="dataconnect_services", + function="set_data_connect_service", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py index 8ef7ec09e..58e3d55d6 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, @@ -33,6 +32,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + identitySourceId=dict(type="str"), identitySourceName=dict(type="str"), ifAuthFail=dict(type="str"), ifProcessFail=dict(type="str"), @@ -58,6 +58,7 @@ class DeviceAdministrationAuthenticationRules(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + identity_source_id=params.get("identitySourceId"), identity_source_name=params.get("identitySourceName"), if_auth_fail=params.get("ifAuthFail"), if_process_fail=params.get("ifProcessFail"), @@ -133,6 +134,7 @@ class DeviceAdministrationAuthenticationRules(object): requested_obj = self.new_object obj_params = [ + ("identitySourceId", "identity_source_id"), ("identitySourceName", "identity_source_name"), ("ifAuthFail", "if_auth_fail"), ("ifProcessFail", "if_process_fail"), diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py index c1a42a95c..2645800ce 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py index 97df92d65..3f32c7c94 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py @@ -37,6 +37,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -70,6 +71,7 @@ class DeviceAdministrationConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -152,6 +154,7 @@ class DeviceAdministrationConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py index 895c4c6e2..38718ced2 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py index 570495d89..27f5b3401 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py index 502b5b6c3..10bcdc558 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py @@ -38,7 +38,11 @@ argument_spec.update(dict( id=dict(type="str"), link=dict(type="dict"), name=dict(type="str"), - conditions=dict(type="list"), + deviceList=dict(type="list"), + cliDnisList=dict(type="list"), + ipAddrList=dict(type="list"), + macAddrList=dict(type="list"), + deviceGroupList=dict(type="list"), )) required_if = [ @@ -59,7 +63,11 @@ class DeviceAdministrationNetworkConditions(object): id=params.get("id"), link=params.get("link"), name=params.get("name"), - conditions=params.get("conditions"), + device_list=params.get("deviceList"), + cli_dnis_list=params.get("cliDnisList"), + ip_addr_list=params.get("ipAddrList"), + mac_addr_list=params.get("macAddrList"), + device_group_list=params.get("deviceGroupList"), ) def get_object_by_name(self, name): @@ -124,7 +132,11 @@ class DeviceAdministrationNetworkConditions(object): ("id", "id"), ("link", "link"), ("name", "name"), - ("conditions", "conditions"), + ("deviceList", "device_list"), + ("cliDnisList", "cli_dnis_list"), + ("ipAddrList", "ip_addr_list"), + ("macAddrList", "mac_addr_list"), + ("deviceGroupList", "device_group_list"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py index 35431f36e..e0ffd4d73 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py @@ -40,6 +40,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -73,6 +74,7 @@ class DeviceAdministrationTimeDateConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -150,6 +152,7 @@ class DeviceAdministrationTimeDateConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py new file mode 100644 index 000000000..4b4d92cbe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="edda", + function='get_edda_dictionary_references', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/endpoint.py b/ansible_collections/cisco/ise/plugins/action/endpoint.py index b8526e704..5de00e6d8 100644 --- a/ansible_collections/cisco/ise/plugins/action/endpoint.py +++ b/ansible_collections/cisco/ise/plugins/action/endpoint.py @@ -31,6 +31,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + name=dict(type="str"), description=dict(type="str"), mac=dict(type="str"), profileId=dict(type="str"), @@ -46,8 +47,8 @@ argument_spec.update(dict( )) required_if = [ - ("state", "present", ["id", "mac"], True), - ("state", "absent", ["id", "mac"], True), + ("state", "present", ["id", "name"], True), + ("state", "absent", ["id", "name"], True), ] required_one_of = [] mutually_exclusive = [] @@ -58,6 +59,7 @@ class Endpoint(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + name=params.get("name"), description=params.get("description"), mac=params.get("mac"), profile_id=params.get("profileId"), @@ -123,10 +125,7 @@ class Endpoint(object): result = False prev_obj = None id = self.new_object.get("id") - name = self.new_object.get("mac") - if name: - name = re.sub("[-:.]", "", name).lower() - self.new_object.update(dict(mac=name)) + name = self.new_object.get("name") if id: prev_obj = self.get_object_by_id(id) result = prev_obj is not None and isinstance(prev_obj, dict) @@ -139,6 +138,7 @@ class Endpoint(object): requested_obj = self.new_object obj_params = [ + ("name", "name"), ("description", "description"), ("mac", "mac"), ("profileId", "profile_id"), @@ -168,7 +168,7 @@ class Endpoint(object): def update(self): id = self.new_object.get("id") - name = self.new_object.get("mac") + name = self.new_object.get("name") result = None if not id: id_ = self.get_object_by_name(name).get("id") @@ -182,7 +182,7 @@ class Endpoint(object): def delete(self): id = self.new_object.get("id") - name = self.new_object.get("mac") + name = self.new_object.get("name") result = None if not id: id_ = self.get_object_by_name(name).get("id") diff --git a/ansible_collections/cisco/ise/plugins/action/filter_policy.py b/ansible_collections/cisco/ise/plugins/action/filter_policy.py index 3f4732053..d2a3ca73e 100644 --- a/ansible_collections/cisco/ise/plugins/action/filter_policy.py +++ b/ansible_collections/cisco/ise/plugins/action/filter_policy.py @@ -31,9 +31,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ise_compare_equality, get_dict_result, ) -from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( - InconsistentParameters, -) # Get common arguments specification argument_spec = ise_argument_spec() diff --git a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py index c4c748317..643df1b6d 100644 --- a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py +++ b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py @@ -84,7 +84,7 @@ class ActionModule(ActionBase): family="misc", function='get_active_count', params=self.get_object(self._task.args) - ).response['count'] + ).response['sessionCount']['count'] self._result.update(dict(ise_response=response)) self._result.update(ise.exit_json()) return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py index 63e8d4bce..b8663b844 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, @@ -33,6 +32,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + identitySourceId=dict(type="str"), identitySourceName=dict(type="str"), ifAuthFail=dict(type="str"), ifProcessFail=dict(type="str"), @@ -58,6 +58,7 @@ class NetworkAccessAuthenticationRules(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + identity_source_id=params.get("identitySourceId"), identity_source_name=params.get("identitySourceName"), if_auth_fail=params.get("ifAuthFail"), if_process_fail=params.get("ifProcessFail"), @@ -133,6 +134,7 @@ class NetworkAccessAuthenticationRules(object): requested_obj = self.new_object obj_params = [ + ("identitySourceId", "identity_source_id"), ("identitySourceName", "identity_source_name"), ("ifAuthFail", "if_auth_fail"), ("ifProcessFail", "if_process_fail"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py index 889963294..2b6ae8c21 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py @@ -21,9 +21,7 @@ from ansible.errors import AnsibleActionFail from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, - ise_compare_equality, ise_compare_equality2, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py index a80689189..7ab7a5b7e 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py @@ -37,6 +37,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -70,6 +71,7 @@ class NetworkAccessConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -152,6 +154,7 @@ class NetworkAccessConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py index b2d3e9bcd..b67519de4 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py index 462fd6081..c5b3c4d86 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py index 65957d072..23b46c263 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py @@ -40,6 +40,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -73,6 +74,7 @@ class NetworkAccessTimeDateConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -150,6 +152,7 @@ class NetworkAccessTimeDateConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_device_group.py b/ansible_collections/cisco/ise/plugins/action/network_device_group.py index 8cd682e9c..d45ef371a 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_device_group.py +++ b/ansible_collections/cisco/ise/plugins/action/network_device_group.py @@ -32,7 +32,7 @@ argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), name=dict(type="str"), description=dict(type="str"), - othername=dict(type="str"), + ndgtype=dict(type="str"), id=dict(type="str"), )) @@ -51,7 +51,7 @@ class NetworkDeviceGroup(object): self.new_object = dict( name=params.get("name"), description=params.get("description"), - othername=params.get("othername"), + ndgtype=params.get("ndgtype"), id=params.get("id"), ) @@ -122,7 +122,7 @@ class NetworkDeviceGroup(object): obj_params = [ ("name", "name"), ("description", "description"), - ("othername", "othername"), + ("ndgtype", "ndgtype"), ("id", "id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params diff --git a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py index af546b5ef..9d5364d4d 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py +++ b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py @@ -37,7 +37,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py index 9cbd890b9..386e2aada 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py @@ -37,7 +37,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py index 71f25d3d7..53a9a7920 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py +++ b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py @@ -21,7 +21,6 @@ from ansible.errors import AnsibleActionFail from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, - ise_compare_equality, ise_compare_equality2, get_dict_result, ) diff --git a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py index def196c60..2a6dcb0b2 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py @@ -36,7 +36,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py index e6e6668b7..7e4007d03 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py index a0a3e6d8a..8acba2dd2 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py index 9de4ae5ae..8e7a1c2b5 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py index 708551dd2..2a1b008f2 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py index bca25ce3d..085271454 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py @@ -10,8 +10,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ise_compare_equality, @@ -97,7 +95,7 @@ class ActionModule(ActionBase): try: prev_obj = node.get_roles_services() except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if prev_obj: if obj.requires_update(prev_obj, request_obj): try: diff --git a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py index 1e138018a..298223855 100644 --- a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py +++ b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py @@ -33,6 +33,7 @@ argument_spec.update(dict( name=dict(type="str"), description=dict(type="str"), ersRestIDStoreAttributes=dict(type="dict"), + ersRestIDStoreUserAttributes=dict(type="dict"), id=dict(type="str"), )) @@ -52,6 +53,7 @@ class RestIdStore(object): name=params.get("name"), description=params.get("description"), ers_rest_idstore_attributes=params.get("ersRestIDStoreAttributes"), + ers_rest_idstore_user_attributes=params.get("ersRestIDStoreUserAttributes"), id=params.get("id"), ) @@ -120,6 +122,7 @@ class RestIdStore(object): ("name", "name"), ("description", "description"), ("ersRestIDStoreAttributes", "ers_rest_idstore_attributes"), + ("ersRestIDStoreUserAttributes", "ers_rest_idstore_user_attributes"), ("id", "id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params @@ -129,6 +132,7 @@ class RestIdStore(object): for (ise_param, ansible_param) in obj_params) def create(self): + print(self.new_object) result = self.ise.exec( family="restid_store", function="create_rest_id_store", @@ -221,6 +225,7 @@ class ActionModule(ActionBase): self._result.update(dict(ise_update_response=ise_update_response)) (obj_exists, updated_obj) = obj.exists() response = updated_obj + ise.object_updated() has_changed = None has_changed = ise_update_response.get("UpdatedFieldsList").get("updatedField") if (len(has_changed) == 0 or diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/action/subscriber.py index 3cb7209b8..a3713078a 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -33,42 +33,46 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), - description=dict(type="str"), - id=dict(type="str"), - name=dict(type="str"), - networkIdentities=dict(type="list"), + enabled=dict(type="bool"), + friendlyName=dict(type="str"), + identityGroups=dict(type="str"), + imeis=dict(type="str"), + imsi=dict(type="str"), + ki=dict(type="str"), + opc=dict(type="str"), + subscriberId=dict(type="str"), )) -required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), -] +required_if = [] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecNbarApp(object): +class Subscriber(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( - description=params.get("description"), - id=params.get("id"), - name=params.get("name"), - network_identities=params.get("networkIdentities"), + enabled=params.get("enabled"), + friendly_name=params.get("friendlyName"), + identity_groups=params.get("identityGroups"), + imeis=params.get("imeis"), + imsi=params.get("imsi"), + ki=params.get("ki"), + opc=params.get("opc"), + subscriber_id=params.get("subscriberId"), ) def get_object_by_name(self, name): # NOTICE: Get does not support/work for filter by name with EQ result = None gen_items_responses = self.ise.exec( - family="nbar_app", - function="get_nbar_apps_generator", - params={"filter": "name.EQ.{name}".format(name=name)} + family="subscriber", + function="get_all_subscribers_generator" ) try: for items_response in gen_items_responses: - items = items_response.response['response'] + items = items_response.response.get('response', []) result = get_dict_result(items, 'name', name) if result: return result @@ -90,10 +94,10 @@ class TrustsecNbarApp(object): def get_object_by_id(self, id): try: result = self.ise.exec( - family="nbar_app", - function="get_nbar_app_by_id", + family="subscriber", + function="get_subscriber_by_id", handle_func_exception=False, - params={"id": id} + params={"subscriber_id": id} ).response['response'] except (TypeError, AttributeError) as e: self.ise.fail_json( @@ -107,15 +111,13 @@ class TrustsecNbarApp(object): ) except Exception: result = None - if isinstance(result, list) and len(result) > 0: - return result[0] return result def exists(self): id_exists = False name_exists = False prev_obj = None - o_id = self.new_object.get("id") + o_id = self.new_object.get("subscriberId") name = self.new_object.get("name") if o_id: prev_obj = self.get_object_by_id(o_id) @@ -136,10 +138,14 @@ class TrustsecNbarApp(object): requested_obj = self.new_object obj_params = [ - ("description", "description"), - ("id", "id"), - ("name", "name"), - ("networkIdentities", "network_identities"), + ("enabled", "enabled"), + ("friendlyName", "friendly_name"), + ("identityGroups", "identity_groups"), + ("imeis", "imeis"), + ("imsi", "imsi"), + ("ki", "ki"), + ("opc", "opc"), + ("subscriberId", "subscriber_id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -149,8 +155,8 @@ class TrustsecNbarApp(object): def create(self): result = self.ise.exec( - family="nbar_app", - function="create_nbar_app", + family="subscriber", + function="create_subscriber", params=self.new_object, ).response return result @@ -163,8 +169,8 @@ class TrustsecNbarApp(object): id_ = self.get_object_by_name(name).get("id") self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="nbar_app", - function="update_nbar_app_by_id", + family="subscriber", + function="update_subscriber", params=self.new_object ).response return result @@ -177,8 +183,8 @@ class TrustsecNbarApp(object): id_ = self.get_object_by_name(name).get("id") self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="nbar_app", - function="delete_nbar_app_by_id", + family="subscriber", + function="delete_subscriber", params=self.new_object ).response return result @@ -218,7 +224,7 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecNbarApp(self._task.args, ise) + obj = Subscriber(self._task.args, ise) state = self._task.args.get("state") diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py index 349b4bc85..bd392306d 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -27,7 +27,8 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + ItemList=dict(type="list"), + operation=dict(type="str"), )) required_if = [] @@ -65,7 +66,8 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + item_list=params.get("ItemList"), + operation=params.get("operation"), ) return new_object @@ -78,8 +80,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_create_sg_vn_mappings", + family="subscriber", + function="bulk_subscriber_operation", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py new file mode 100644 index 000000000..f82cd0d6d --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py @@ -0,0 +1,98 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + imsi=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + imsi=params.get("imsi"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("imsi") + name = self._task.args.get("name") + if id: + response = ise.exec( + family="subscriber", + function='get_subscriber_by_i_m_s_i', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result + if not name and not id: + # NOTICE: Does not have a get all method or it is in another action + response = None + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py index 42820bc30..65d8cc69c 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -29,11 +29,11 @@ argument_spec = ise_argument_spec() argument_spec.update(dict( page=dict(type="int"), size=dict(type="int"), + filter=dict(type="str"), + filterType=dict(type="str"), sort=dict(type="str"), sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), + subscriberId=dict(type="str"), )) required_if = [] @@ -73,11 +73,11 @@ class ActionModule(ActionBase): new_object = dict( page=params.get("page"), size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), filter=params.get("filter"), filter_type=params.get("filterType"), - id=params.get("id"), + sort=params.get("sort"), + sort_by=params.get("sortBy"), + subscriber_id=params.get("subscriberId"), ) return new_object @@ -91,12 +91,12 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) - id = self._task.args.get("id") + id = self._task.args.get("subscriberId") name = self._task.args.get("name") if id: response = ise.exec( - family="sg_vn_mapping", - function='get_sg_vn_mapping_by_id', + family="subscriber", + function='get_subscriber_by_id', params=self.get_object(self._task.args) ).response['response'] self._result.update(dict(ise_response=response)) @@ -105,8 +105,8 @@ class ActionModule(ActionBase): if not name and not id: responses = [] generator = ise.exec( - family="sg_vn_mapping", - function='get_sg_vn_mappings_generator', + family="subscriber", + function='get_all_subscribers_generator', params=self.get_object(self._task.args), ) try: diff --git a/ansible_collections/cisco/ise/plugins/action/system_certificate.py b/ansible_collections/cisco/ise/plugins/action/system_certificate.py index 0ca926288..3faae7fec 100644 --- a/ansible_collections/cisco/ise/plugins/action/system_certificate.py +++ b/ansible_collections/cisco/ise/plugins/action/system_certificate.py @@ -121,7 +121,7 @@ class SystemCertificate(object): function="get_system_certificate_by_id", params={"id": id, "host_name": host_name}, handle_func_exception=False, - ).response + ).response['response'] except Exception as e: result = None return result @@ -143,6 +143,18 @@ class SystemCertificate(object): def requires_update(self, current_obj): requested_obj = self.new_object + used_by_value = current_obj.get("usedBy") + if used_by_value is None or used_by_value.lower() == "not in use": + current_obj["eap"] = False + current_obj["pxgrid"] = False + current_obj["radius"] = False + current_obj["ims"] = False + else: + current_obj["eap"] = "eap" in used_by_value.lower() + current_obj["pxgrid"] = "pxgrid" in used_by_value.lower() + current_obj["radius"] = "radius" in used_by_value.lower() + current_obj["ims"] = "ims" in used_by_value.lower() + obj_params = [ ("admin", "admin"), ("allowPortalTagTransferForSameSubject", "allow_portal_tag_transfer_for_same_subject"), @@ -153,7 +165,7 @@ class SystemCertificate(object): ("expirationTTLPeriod", "expiration_ttl_period"), ("expirationTTLUnits", "expiration_ttl_units"), ("ims", "ims"), - ("name", "name"), + ("friendlyName", "name"), ("portal", "portal"), ("portalGroupTag", "portal_group_tag"), ("pxgrid", "pxgrid"), diff --git a/ansible_collections/cisco/ise/plugins/action/test_connector.py b/ansible_collections/cisco/ise/plugins/action/test_connector.py new file mode 100644 index 000000000..f3a1b5797 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/test_connector.py @@ -0,0 +1,98 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + authType=dict(type="str"), + authValues=dict(type="dict"), + connectorName=dict(type="str"), + responseParsing=dict(type="str"), + uniqueID=dict(type="str"), + url=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = False + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + auth_type=params.get("authType"), + auth_values=params.get("authValues"), + connector_name=params.get("connectorName"), + response_parsing=params.get("responseParsing"), + unique_id=params.get("uniqueID"), + url=params.get("url"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + ise = ISESDK(params=self._task.args) + + response = ise.exec( + family="edda", + function="test_connector", + params=self.get_object(self._task.args), + ).response + + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py deleted file mode 100644 index e0390f20e..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="nbar_app", - function='get_nbar_app_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="nbar_app", - function='get_nbar_apps_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py deleted file mode 100644 index f522e9296..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py +++ /dev/null @@ -1,267 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, - ise_compare_equality, - get_dict_result, -) -from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( - InconsistentParameters, -) - -# Get common arguments specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - state=dict(type="str", default="present", choices=["present", "absent"]), - id=dict(type="str"), - lastUpdate=dict(type="str"), - sgName=dict(type="str"), - sgtId=dict(type="str"), - vnId=dict(type="str"), - vnName=dict(type="str"), -)) - -required_if = [ - ("state", "present", ["id", "sgName", "vnName"], True), - ("state", "absent", ["id", "sgName", "vnName"], True), -] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class TrustsecSgVnMapping(object): - def __init__(self, params, ise): - self.ise = ise - self.new_object = dict( - id=params.get("id"), - last_update=params.get("lastUpdate"), - sg_name=params.get("sgName"), - sgt_id=params.get("sgtId"), - vn_id=params.get("vnId"), - vn_name=params.get("vnName"), - ) - - def get_object_by_name(self, sg_name, vn_name): - # NOTICE: Get does not support/work for filter by name with EQ - result = None - gen_items_responses = self.ise.exec( - family="sg_vn_mapping", - function="get_sg_vn_mappings_generator" - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - for item in items: - if isinstance(item, dict) and item.get('sgName') == sg_name and item.get('vnName') == vn_name: - result = item - break - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result - return result - - def get_object_by_id(self, id): - try: - result = self.ise.exec( - family="sg_vn_mapping", - function="get_sg_vn_mapping_by_id", - handle_func_exception=False, - params={"id": id} - ).response['response'] - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - if isinstance(result, list) and len(result) > 0: - return result[0] - return result - - def exists(self): - id_exists = False - name_exists = False - prev_obj = None - o_id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - if o_id: - prev_obj = self.get_object_by_id(o_id) - id_exists = prev_obj is not None and isinstance(prev_obj, dict) - if not id_exists and sg_name and vn_name: - prev_obj = self.get_object_by_name(sg_name, vn_name) - name_exists = prev_obj is not None and isinstance(prev_obj, dict) - if name_exists: - _id = prev_obj.get("id") - if id_exists and name_exists and o_id != _id: - raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) - it_exists = prev_obj is not None and isinstance(prev_obj, dict) - return (it_exists, prev_obj) - - def requires_update(self, current_obj): - requested_obj = self.new_object - - obj_params = [ - ("id", "id"), - ("lastUpdate", "last_update"), - ("sgName", "sg_name"), - ("sgtId", "sgt_id"), - ("vnId", "vn_id"), - ("vnName", "vn_name"), - ] - # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params - # If any does not have eq params, it requires update - return any(not ise_compare_equality(current_obj.get(ise_param), - requested_obj.get(ansible_param)) - for (ise_param, ansible_param) in obj_params) - - def create(self): - result = self.ise.exec( - family="sg_vn_mapping", - function="create_sg_vn_mapping", - params=self.new_object, - ).response - return result - - def update(self): - id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - result = None - if not id: - id_ = self.get_object_by_name(sg_name, vn_name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="sg_vn_mapping", - function="update_sg_vn_mapping_by_id", - params=self.new_object - ).response - return result - - def delete(self): - id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - result = None - if not id: - id_ = self.get_object_by_name(sg_name, vn_name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="sg_vn_mapping", - function="delete_sg_vn_mapping_by_id", - params=self.new_object - ).response - return result - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - obj = TrustsecSgVnMapping(self._task.args, ise) - - state = self._task.args.get("state") - - response = None - - if state == "present": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - if obj.requires_update(prev_obj): - ise_update_response = obj.update() - self._result.update(dict(ise_update_response=ise_update_response)) - (obj_exists, updated_obj) = obj.exists() - response = updated_obj - ise.object_updated() - else: - response = prev_obj - ise.object_already_present() - else: - ise_create_response = obj.create() - (obj_exists, created_obj) = obj.exists() - response = created_obj - ise.object_created() - - elif state == "absent": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - obj.delete() - response = prev_obj - ise.object_deleted() - else: - ise.object_already_absent() - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py deleted file mode 100644 index d6aed5405..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="virtual_network", - function="bulk_delete_virtual_networks", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py deleted file mode 100644 index 4b37b3318..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="virtual_network", - function="bulk_update_virtual_networks", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py deleted file mode 100644 index 0029067ea..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="virtual_network", - function='get_virtual_network_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="virtual_network", - function='get_virtual_networks_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py deleted file mode 100644 index 361916f3a..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_create_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py deleted file mode 100644 index 6cb9d9353..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_delete_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py deleted file mode 100644 index fa6f11edd..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_update_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py deleted file mode 100644 index f99235f74..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="vn_vlan_mapping", - function='get_vn_vlan_mapping_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="vn_vlan_mapping", - function='get_vn_vlan_mappings_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py index dfb7ad90a..c115588b3 100644 --- a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py +++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py @@ -65,6 +65,12 @@ options: type: bool default: false version_added: '3.0.0' + ise_single_request_timeout: + description: + - Timeout (in seconds) for RESTful HTTP requests. + type: int + default: 60 + version_added: '3.0.0' notes: - "Does not support C(check_mode)" - "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK" diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py index 57e385ca6..baae22540 100644 --- a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py +++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py @@ -65,6 +65,12 @@ options: type: bool default: false version_added: '3.0.0' + ise_single_request_timeout: + description: + - Timeout (in seconds) for RESTful HTTP requests. + type: int + default: 60 + version_added: '3.0.0' notes: - "Supports C(check_mode)" - "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK" diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py index d08c9ebfb..b8d1afa37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py @@ -43,7 +43,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py index 3c6e5f13b..b338f5888 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py @@ -87,7 +87,7 @@ options: description: ACI Settings's untaggedPacketIepgName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py index 5884b4728..61bad7bbe 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py index 5608cde0c..61d13bf89 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory.py b/ansible_collections/cisco/ise/plugins/modules/active_directory.py index 5fa9d41bf..0cc8e53ec 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory.py @@ -191,7 +191,7 @@ options: alphanumeric and .-_/\\ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py index 298a05eb7..729454376 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py @@ -190,7 +190,7 @@ options: alphanumeric and .-_/\\ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py index 46dd9467c..f0925183c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -74,7 +74,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py index 5291dfc12..d8e4db519 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py index 2584e6f50..5fbe56eb9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -70,7 +70,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py index b07f435ce..6782bb235 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py index bc2e30553..6dc4da875 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py index 26d847184..4f1e46c87 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py index 787103629..7359c6151 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py index 748478d72..6974288ac 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py @@ -21,7 +21,7 @@ options: - Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py index 78692e0fc..2df9027f7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -67,7 +67,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py index 23c7bc99b..cf793e354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py index 6a9d3868e..88fa594b4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py +++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py @@ -310,7 +310,7 @@ options: type: bool type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py index 69241303d..84b86e5e9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py index ebb530e2e..f1fde8079 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py index 64b14136c..2615a8aff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py index f2d1971d1..3e9037107 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py @@ -23,7 +23,7 @@ options: description: ANC Endpoint Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py index 371f16a2b..1117dafa2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py index 8a198d96c..5a58c8f22 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py index 67ae179e9..a49bc949f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py @@ -33,7 +33,7 @@ options: description: ANC Policy's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py index 1a3f9c081..285529a89 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py index 0161c722a..ea2e59efc 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py @@ -23,7 +23,7 @@ options: description: ANC Policy Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py index 904267a31..21051ffdf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py index b00dd4aa1..75587110f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py @@ -174,7 +174,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py index c4b89790a..2b0f7bfcb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py index 421c086d1..11176958d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_config.py index ce5a43eb3..ef5a51df3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_config.py @@ -31,7 +31,7 @@ options: get copied. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py index 9b176d705..7d22a9314 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py index 1480f8d65..908059a00 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py @@ -30,7 +30,7 @@ options: true, false. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py index 74ab9ab7b..e994d04d2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py @@ -57,7 +57,7 @@ options: description: Backup Schedule Config's weekDay. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py index 9babddc26..a8ce5bb2a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py @@ -57,7 +57,7 @@ options: description: Backup Schedule Config Update's weekDay. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py index 74576e8c5..1dcccb2b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py @@ -68,7 +68,7 @@ options: description: Validate Certificate Extensions. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py index c3b77fada..b6073d0f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py @@ -259,7 +259,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py index ed187dfab..530eae753 100644 --- a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py index dcddcd19b..da2bb18b7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py @@ -51,7 +51,7 @@ options: - an option only in AD). type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py index d996fb146..ff5eac756 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py index 4d6d0d183..580e85c1a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration.py b/ansible_collections/cisco/ise/plugins/modules/configuration.py new file mode 100644 index 000000000..1c551c299 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/configuration.py @@ -0,0 +1,71 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: configuration +short_description: Resource module for Configuration +description: +- Manage operation update of the resource Configuration. +- API to enable/disable LSD settings. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + enableEPO: + description: To enable/disable LSD ownership settings. + type: bool + enableRCM: + description: To enable/disable random mac(RCM) settings. Please note that this flag + will be set to false if enableEPO flag is false. + type: bool +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + configuration.Configuration.update_configuration, + + - Paths used are + put /api/v1/lsd/updateLsdSettings, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.configuration: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enableEPO: true + enableRCM: true + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration_info.py b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py new file mode 100644 index 000000000..6a942dedf --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py @@ -0,0 +1,51 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: configuration_info +short_description: Information module for Configuration +description: +- Get all Configuration. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + configuration.Configuration.get_configuration, + + - Paths used are + get /api/v1/lsd/updateLsdSettings, + +""" + +EXAMPLES = r""" +- name: Get all Configuration + cisco.ise.configuration_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config.py b/ansible_collections/cisco/ise/plugins/modules/connector_config.py new file mode 100644 index 000000000..b374012b1 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/connector_config.py @@ -0,0 +1,305 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: connector_config +short_description: Resource module for Connector Config +description: +- Manage operations create, update and delete of the resource Connector Config. +- EDDA - Configure connectorconfig information. +- EDDA - Delete Configure connectorConfig information based on ConnectorName. +- EDDA - update Configure connectorConfig information based on ConnectorName. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + additionalProperties: + description: Connector Config's additionalProperties. + type: dict + attributes: + description: ConnectorName. + suboptions: + attributeMapping: + description: <p>List of feature names</p>. + elements: dict + suboptions: + dictionaryAttribute: + description: Connector Config's dictionaryAttribute. + type: str + includeInDictionary: + description: IncludeInDictionary flag. + type: bool + jsonAttribute: + description: Connector Config's jsonAttribute. + type: str + type: list + bulkUniqueIdentifier: + description: Uniqueness to identify. + type: str + topLevelObject: + description: Root level of json. + type: str + uniqueIdentifier: + description: Uniqueness to identify. + type: str + versionIdentifier: + description: Version uniqueness to identify. + type: str + type: dict + connectorName: + description: ConnectorName. + type: str + connectorType: + description: Connector Type list. + type: str + deltasyncSchedule: + description: Connector Config's deltasyncSchedule. + suboptions: + interval: + description: Run at interval (hours). + type: int + intervalUnit: + description: Interval Units. + type: str + startDate: + description: Start date and Time. + type: str + type: dict + description: + description: Description. + type: str + enabled: + description: Enabled flag. + type: bool + fullsyncSchedule: + description: Connector Config's fullsyncSchedule. + suboptions: + interval: + description: Run at interval (hours). + type: int + intervalUnit: + description: Interval Units. + type: str + startDate: + description: Start date and Time. + type: str + type: dict + protocol: + description: Protocol. + type: str + skipCertificateValidations: + description: SkipCertificateValidations flag. + type: bool + url: + description: Connector Config's url. + suboptions: + accessKey: + description: Accesskey. + type: str + authenticationType: + description: Authentication Type list. + type: str + bulkUrl: + description: BulkUrl. + type: str + clientId: + description: Clientid. + type: str + clientSecret: + description: Clientsecret. + type: str + incrementalUrl: + description: IncrementalUrl. + type: str + password: + description: Password. + type: str + refreshToken: + description: Refreshtoken. + type: str + tokenHeader: + description: TokenHeader. + type: str + userName: + description: UserName. + type: str + type: dict +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.create_connector_config, + edda.Edda.delete_connector_config_by_connector_name, + edda.Edda.update_connector_config_by_connector_name, + + - Paths used are + post /api/v1/edda/connector-config, + delete /api/v1/edda/connector-config/{connectorName}, + put /api/v1/edda/connector-config/{connectorName}, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + additionalProperties: {} + attributes: + attributeMapping: + - dictionaryAttribute: string + includeInDictionary: true + jsonAttribute: string + bulkUniqueIdentifier: string + topLevelObject: string + uniqueIdentifier: string + versionIdentifier: string + connectorName: string + connectorType: string + deltasyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + description: string + enabled: true + fullsyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + protocol: string + skipCertificateValidations: true + url: + accessKey: string + authenticationType: string + bulkUrl: string + clientId: string + clientSecret: string + incrementalUrl: string + password: string + refreshToken: string + tokenHeader: string + userName: string + +- name: Update by name + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + additionalProperties: {} + attributes: + attributeMapping: + - dictionaryAttribute: string + includeInDictionary: true + jsonAttribute: string + bulkUniqueIdentifier: string + topLevelObject: string + uniqueIdentifier: string + versionIdentifier: string + connectorName: string + connectorType: string + deltasyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + description: string + enabled: true + fullsyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + protocol: string + skipCertificateValidations: true + url: + accessKey: string + authenticationType: string + bulkUrl: string + clientId: string + clientSecret: string + incrementalUrl: string + password: string + refreshToken: string + tokenHeader: string + userName: string + +- name: Delete by name + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: absent + connectorName: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connector": { + "additionalProperties": {}, + "attributes": { + "attributeMapping": [ + { + "dictionaryAttribute": "string", + "includeInDictionary": true, + "jsonAttribute": "string" + } + ], + "bulkUniqueIdentifier": "string", + "topLevelObject": "string", + "uniqueIdentifier": "string", + "versionIdentifier": "string" + }, + "connectorName": "string", + "connectorType": "string", + "deltasyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "description": "string", + "enabled": true, + "fullsyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "protocol": "string", + "skipCertificateValidations": true, + "url": { + "accessKey": "string", + "authenticationType": "string", + "bulkUrl": "string", + "clientId": "string", + "clientSecret": "string", + "incrementalUrl": "string", + "password": "string", + "refreshToken": "string", + "tokenHeader": "string", + "userName": "string" + } + } + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: str + sample: > + "'string'" +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py new file mode 100644 index 000000000..698dd2fd7 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py @@ -0,0 +1,111 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: connector_config_info +short_description: Information module for Connector Config +description: +- Get all Connector Config. +- Get Connector Config by name. +- EDDA - Get ALL connectorConfig information. +- EDDA - Get connectorConfig information based on ConnectorName. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: + connectorName: + description: + - ConnectorName path parameter. Update or delete or retrieve the connector config. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.get_connector_config, + edda.Edda.get_connector_config_by_connector_name, + + - Paths used are + get /api/v1/edda/connector-config, + get /api/v1/edda/connector-config/{connectorName}, + +""" + +EXAMPLES = r""" +- name: Get all Connector Config + cisco.ise.connector_config_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +- name: Get Connector Config by name + cisco.ise.connector_config_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + connectorName: string + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connector": { + "additionalProperties": {}, + "attributes": { + "attributeMapping": [ + { + "dictionaryAttribute": "string", + "includeInDictionary": true, + "jsonAttribute": "string" + } + ], + "bulkUniqueIdentifier": "string", + "topLevelObject": "string", + "uniqueIdentifier": "string", + "versionIdentifier": "string" + }, + "connectorName": "string", + "connectorType": "string", + "deltasyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "description": "string", + "enabled": true, + "fullsyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "protocol": "string", + "skipCertificateValidations": true, + "url": { + "accessKey": "string", + "authenticationType": "string", + "bulkUrl": "string", + "clientId": "string", + "clientSecret": "string", + "incrementalUrl": "string", + "password": "string", + "refreshToken": "string", + "tokenHeader": "string", + "userName": "string" + } + } + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py index 13d1f134d..0fc26c12b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py @@ -10,7 +10,7 @@ module: csr_delete short_description: Resource module for CSR Delete description: - Manage operation delete of the resource CSR Delete. -- This API deletes a Certificate Signing Request of a particular node based on given HostName and ID. +- This API deletes the certificate signing request of a particular node based on a given hostname and ID. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module @@ -24,7 +24,7 @@ options: description: Id path parameter. ID of the Certificate Signing Request to be deleted. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py index a1f8b85e1..4cadca891 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py @@ -37,7 +37,7 @@ options: - The filename used to save the download file. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py index 3116b3802..3d769adc0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py @@ -76,7 +76,7 @@ options: description: CSR Generate's usedFor. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py index f7eaaf20d..b8727a777 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py @@ -10,14 +10,14 @@ module: csr_generate_intermediate_ca short_description: Resource module for CSR Generate Intermediate CA description: - Manage operation create of the resource CSR Generate Intermediate CA. -- CSR Generation for Intermediate Certificates. +- CSR generation for Intermediate Certificates. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_info.py index 6dee74b16..3ccee98ed 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_info.py @@ -69,7 +69,7 @@ options: - Id path parameter. ID of the Certificate Signing Request returned. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py new file mode 100644 index 000000000..3c213e44c --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py @@ -0,0 +1,54 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_info +short_description: Information module for Dataconnect Info +description: +- Get all Dataconnect Info. +- This API retrieves the Dataconnect ODBC details. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.get_odbc_detail, + + - Paths used are + get /api/v1/mnt/data-connect/details, + +""" + +EXAMPLES = r""" +- name: Get all Dataconnect Info + cisco.ise.dataconnect_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "hostname": "string", + "port": 0, + "servicename": "string", + "username": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py new file mode 100644 index 000000000..cbb6aff7e --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py @@ -0,0 +1,54 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_info +short_description: Information module for Dataconnect Settings +description: +- Get all Dataconnect Settings. +- This API retrieves the status of the Dataconnect feature. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.get_dataconnect_service, + + - Paths used are + get /api/v1/mnt/data-connect/settings, + +""" + +EXAMPLES = r""" +- name: Get all Dataconnect Settings + cisco.ise.dataconnect_settings_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "isEnabled": true, + "isPasswordChanged": true, + "passwordExpiresInDays": 0, + "passwordExpiresOn": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py new file mode 100644 index 000000000..4f731bf44 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py @@ -0,0 +1,60 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_password +short_description: Resource module for Dataconnect Settings Password +description: +- Manage operation update of the resource Dataconnect Settings Password. +- This API updates the Dataconnect user password. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + password: + description: 'Password for dataconnect user. Password must satisfy the following + criteria - Contains at least one uppercase letter A-Z, Contains at least one lowercase + letter a-z, Contains at least one digit 0-9, Contains at least one special character + #$%&*+,-. ;=?^_~, Has at least 12 characters, Has not more than 30 characters.' + type: str +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.update_dataconnect_password, + + - Paths used are + put /api/v1/mnt/data-connect/settings/password, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.dataconnect_settings_password: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + password: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "success": { + "message": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py new file mode 100644 index 000000000..ec4897b57 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py @@ -0,0 +1,57 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_password_expiry +short_description: Resource module for Dataconnect Settings Password Expiry +description: +- Manage operation update of the resource Dataconnect Settings Password Expiry. +- This API updates the number of days of Dataconnect password expiry. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + passwordExpiresInDays: + description: Dataconnect Settings Password Expiry's passwordExpiresInDays. + type: int +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.update_dataconnect_password_expiry, + + - Paths used are + put /api/v1/mnt/data-connect/settings/password/expiry, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.dataconnect_settings_password_expiry: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + passwordExpiresInDays: 0 + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "success": { + "message": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py index 88fa0ce86..f782455ec 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py @@ -6,44 +6,39 @@ DOCUMENTATION = r""" --- -module: trustsec_vn_bulk_delete -short_description: Resource module for Trustsec VN Bulk Delete +module: dataconnect_settings_status +short_description: Resource module for Dataconnect Settings Status description: -- Manage operation create of the resource Trustsec VN Bulk Delete. -version_added: '2.0.0' +- Manage operation update of the resource Dataconnect Settings Status. +- This API updates the DataConnect feature status. +version_added: '2.8.0' extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: - payload: - description: Trustsec VN Bulk Delete's payload. - elements: str - type: list + isEnabled: + description: IsEnabled flag. + type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi notes: - SDK Method used are - virtual_network.VirtualNetwork.bulk_delete_virtual_networks, + dataconnect_services.DataconnectServices.set_data_connect_service, - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/delete, + put /api/v1/mnt/data-connect/settings/status, """ EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_delete: +- name: Update all + cisco.ise.dataconnect_settings_status: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" - payload: - - string + isEnabled: true """ @@ -54,6 +49,9 @@ ise_response: type: dict sample: > { - "id": "string" + "success": { + "message": "string" + }, + "version": "string" } """ diff --git a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py index bc2f70749..f09b21d69 100644 --- a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py @@ -21,7 +21,7 @@ options: - How long to wait for the server to send data before giving up. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PullDeploymentInfo diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py index a238380a1..c65a26ede 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py index 29c2db6d3..e0a283492 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py @@ -21,6 +21,9 @@ options: id: description: Id path parameter. Rule id. type: str + identitySourceId: + description: Identity source id from the identity stores. + type: str identitySourceName: description: Identity source name from the identity stores. type: str @@ -56,6 +59,9 @@ options: condition: description: Device Administration Authentication Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -102,11 +108,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authentication Rules's endDate. @@ -116,11 +123,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authentication Rules's endDate. @@ -140,8 +148,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authentication Rules's endTime. @@ -152,8 +160,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authentication Rules's endTime. @@ -221,7 +229,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules @@ -248,6 +256,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -259,6 +268,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +321,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present id: string + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -322,6 +333,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -385,6 +397,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -407,6 +420,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -462,6 +476,7 @@ ise_update_response: sample: > { "response": { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -484,6 +499,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py index 3e0dfce6a..6e02cd5b6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules @@ -73,6 +73,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -95,6 +96,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py index a34b3aec1..b2d3dbb1f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py index 1e5058c66..a762b3923 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py @@ -52,6 +52,9 @@ options: condition: description: Device Administration Authorization Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -98,11 +101,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authorization Rules's endDate. @@ -112,11 +116,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authorization Rules's endDate. @@ -136,8 +141,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authorization Rules's endTime. @@ -148,8 +153,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authorization Rules's endTime. @@ -217,7 +222,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules @@ -254,6 +259,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -316,6 +322,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -401,6 +408,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -478,6 +486,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py index 8c5f6de1f..8e01d1e0d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py index 23aa5817f..46a9cfcfe 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Command Set diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py index 9db7c229a..e1d2a666f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py @@ -20,6 +20,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -65,11 +68,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Conditions's endDate. @@ -79,11 +82,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Conditions's endDate. @@ -102,8 +105,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Conditions's endTime. @@ -113,8 +117,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Conditions's endTime. @@ -159,7 +164,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -190,6 +195,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -235,6 +241,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -289,6 +296,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -356,6 +364,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -414,6 +423,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py index 073e3b888..f071af305 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py index e2db57818..1fa414c1a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py index c5add18be..6264730c2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py index 90657433a..5fbeeac28 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py @@ -29,7 +29,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py index c603181b9..efcca2198 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py index f1685f1ae..90c278c57 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py index 74afbb5d2..14aaba870 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py index 6bdd2efe6..a6fb8c2b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py @@ -49,6 +49,9 @@ options: condition: description: Device Administration Global Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -95,11 +98,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Global Exception Rules's endDate. @@ -109,11 +113,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Global Exception Rules's endDate. @@ -133,8 +138,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Global Exception Rules's endTime. @@ -145,8 +150,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Global Exception Rules's endTime. @@ -214,7 +219,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules @@ -250,6 +255,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +317,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -395,6 +402,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -472,6 +480,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py index 27f969f61..98b4bf506 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules @@ -89,6 +89,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py index 7a7e1a82a..066bbaf1f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py index a0556f723..b870c7121 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Identity Stores diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py index 92fe6d8dc..9b86cab32 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py @@ -52,6 +52,9 @@ options: condition: description: Device Administration Local Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -98,11 +101,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Local Exception Rules's endDate. @@ -112,11 +116,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Local Exception Rules's endDate. @@ -136,8 +141,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Local Exception Rules's endTime. @@ -148,8 +153,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Local Exception Rules's endTime. @@ -217,7 +222,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules @@ -254,6 +259,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -316,6 +322,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -401,6 +408,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -478,6 +486,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py index cb1cd9142..953ab8564 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py index 8211eb18a..b549075f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py index 30ade1ac5..67c802d16 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py @@ -18,75 +18,37 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + cliDnisList: + description: <p>This field should contain a Caller ID (CLI), comma, and Called ID + (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>. + elements: str + type: list conditionType: description: This field determines the content of the conditions field. type: str - conditions: - description: Device Administration Network Conditions's conditions. - elements: dict - suboptions: - cliDnisList: - description: <p>This field should contain a Caller ID (CLI), comma, and Called - ID (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>. - elements: str - type: list - conditionType: - description: This field determines the content of the conditions field. - type: str - description: - description: Device Administration Network Conditions's description. - type: str - deviceGroupList: - description: <p>This field should contain a tuple with NDG Root, comma, and - an NDG (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>. - elements: str - type: list - deviceList: - description: <p>This field should contain Device-Name,port-number. The device - name must be the same as the name field in a Network Device object.<br> Line - format - Device Name,Port</p>. - elements: str - type: list - id: - description: Device Administration Network Conditions's id. - type: str - ipAddrList: - description: <p>This field should contain IP-address-or-subnet,port number<br> - IP address can be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> - IP subnet can be IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> - Line format - IP Address or subnet,Port</p>. - elements: str - type: list - link: - description: Device Administration Network Conditions's link. - suboptions: - href: - description: Device Administration Network Conditions's href. - type: str - rel: - description: Device Administration Network Conditions's rel. - type: str - type: - description: Device Administration Network Conditions's type. - type: str - type: dict - macAddrList: - description: <p>This field should contain Endstation MAC address, comma, and - Destination MAC addresses.<br> Each Max address must include twelve hexadecimal - digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn - or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>. - elements: str - type: list - name: - description: Network Condition name. - type: str - type: list description: description: Device Administration Network Conditions's description. type: str + deviceGroupList: + description: <p>This field should contain a tuple with NDG Root, comma, and an NDG + (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>. + elements: str + type: list + deviceList: + description: <p>This field should contain Device Name. The device name must be the + same as the name field in a Network Device object. Line format - Device Name</p>. + elements: str + type: list id: description: Device Administration Network Conditions's id. type: str + ipAddrList: + description: <p>This field should contain IP address or subnet.<br> IP address can + be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> IP subnet can be + IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> Line format - + IP Address or subnet</p>. + elements: str + type: list link: description: Device Administration Network Conditions's link. suboptions: @@ -100,11 +62,18 @@ options: description: Device Administration Network Conditions's type. type: str type: dict + macAddrList: + description: <p>This field should contain Endstation MAC address, comma, and Destination + MAC addresses.<br> Each Max address must include twelve hexadecimal digits using + formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br> + Line format - Endstation MAC,Destination MAC </p>. + elements: str + type: list name: description: Network Condition name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Network Conditions @@ -131,32 +100,23 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + cliDnisList: + - string conditionType: string - conditions: - - cliDnisList: - - string - conditionType: string - description: string - deviceGroupList: - - string - deviceList: - - string - id: string - ipAddrList: - - string - link: - href: string - rel: string - type: string - macAddrList: - - string - name: string description: string + deviceGroupList: + - string + deviceList: + - string id: string + ipAddrList: + - string link: href: string rel: string type: string + macAddrList: + - string name: string - name: Update by id @@ -166,32 +126,23 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + cliDnisList: + - string conditionType: string - conditions: - - cliDnisList: - - string - conditionType: string - description: string - deviceGroupList: - - string - deviceList: - - string - id: string - ipAddrList: - - string - link: - href: string - rel: string - type: string - macAddrList: - - string - name: string description: string + deviceGroupList: + - string + deviceList: + - string id: string + ipAddrList: + - string link: href: string rel: string type: string + macAddrList: + - string name: string - name: Delete by id @@ -221,33 +172,20 @@ ise_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] } @@ -268,33 +206,20 @@ ise_update_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] }, "version": "string" diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py index 318e50bb8..59c2eb239 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Network Conditions @@ -76,33 +76,20 @@ ise_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] } """ diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py index b6db2058a..fb0f769a1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py @@ -21,6 +21,9 @@ options: condition: description: Device Administration Policy Set's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -66,11 +69,11 @@ options: additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Policy Set's endDate. @@ -80,11 +83,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Policy Set's endDate. @@ -103,8 +106,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Policy Set's endTime. @@ -114,8 +118,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Policy Set's endTime. @@ -205,7 +210,7 @@ options: matched. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set @@ -233,6 +238,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -292,6 +298,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -373,6 +380,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -447,6 +455,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py index c6894900b..fb996df50 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set @@ -79,6 +79,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py index 88893a0d7..609e0b122 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py index 2a72e4e98..2aba7c1bd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Profiles diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py index 0cd8de91e..77a27332f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Service Names diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py index 0e115d18a..c5326d8cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py @@ -18,6 +18,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -63,11 +66,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Time Date Conditions's endDate. @@ -77,11 +80,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Time Date Conditions's endDate. @@ -100,8 +103,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Time Date Conditions's endTime. @@ -111,8 +115,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Time Date Conditions's endTime. @@ -157,7 +162,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Time/Date Conditions @@ -184,6 +189,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -229,6 +235,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py index 55a513840..26c796202 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Time/Date Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py new file mode 100644 index 000000000..85bb07b7b --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py @@ -0,0 +1,49 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dictionary_references_info +short_description: Information module for Dictionary References Info +description: +- Get all Dictionary References Info. +- EDDA - Get a map of references to EDDA dictionaries. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.get_edda_dictionary_references, + + - Paths used are + get /api/v1/edda/dictionary-references, + +""" + +EXAMPLES = r""" +- name: Get all Dictionary References Info + cisco.ise.dictionary_references_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + {} +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py index 213fcdbd8..f4cd77e29 100644 --- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py +++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py @@ -35,7 +35,7 @@ options: characters _.-. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py index 3931cddac..cb35f5056 100644 --- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py index ac0e06b76..15af377c6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py @@ -44,7 +44,7 @@ options: description: Egress Matrix Cell's sourceSGtId. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py index a24a81b0a..716e9dad9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py index 88df775ee..dd45607d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py @@ -23,7 +23,7 @@ options: description: Egress Matrix Cell Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py index 3e3253397..d5edb3ede 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py index 7dd4fda31..90483a2ea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py @@ -26,7 +26,7 @@ options: description: SrcSGtId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py index eeb4655a8..309b8f242 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py index 1f416034c..ca6f394eb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py @@ -20,7 +20,7 @@ options: description: Status path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint.py index 74db5cd17..d6c3db64f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint.py @@ -102,7 +102,7 @@ options: description: StaticProfileAssignment flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -147,6 +147,7 @@ EXAMPLES = r""" mdmReachable: true mdmSerial: string mdmServerName: string + name: string portalUser: string profileId: string staticGroupAssignment: true @@ -189,6 +190,7 @@ EXAMPLES = r""" mdmReachable: true mdmSerial: string mdmServerName: string + name: string portalUser: string profileId: string staticGroupAssignment: true diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py index 520910f40..920378939 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py index dafe2a80c..f74c5d1f6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py @@ -23,7 +23,7 @@ options: description: Endpoint Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py index 8f31278f4..be6995cbb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py @@ -48,7 +48,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointCertificate diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py index 2835d630e..53f050168 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py index a99a9c024..7507f3e70 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py index 95dd6f659..bf2cf58b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py @@ -31,7 +31,7 @@ options: description: SystemDefined flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointIdentityGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py index 89823b7c6..0850f50a4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointIdentityGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py index 01587f8b7..88a81827d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py index 139631d20..8807a6b11 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py @@ -100,7 +100,7 @@ options: description: StaticProfileAssignment flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py index 82888e4e8..e86e63d9a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py index 50d1ff071..0c16d8c98 100644 --- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py +++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py @@ -67,7 +67,7 @@ options: description: Valid Range 1 to 120. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py index 8b597d056..98bb7c155 100644 --- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py index 9a23b0c1f..c7b3f5696 100644 --- a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py +++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py @@ -35,7 +35,7 @@ options: description: Virtual Network. At least one of subnet or sgt or vn should be defined. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py index 01f9c6e74..486c4c0f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py index 2c82fa379..98f77ab17 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py index 10910f02a..1f7fc6f17 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py @@ -54,7 +54,7 @@ options: description: Username of Secure SMTP server. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py index 7f815219d..dec4146c7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py index 8caf673c0..3dac851e9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py @@ -26,7 +26,7 @@ options: characters _.-. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py index 087a7e0e4..40cc1eaeb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type.py b/ansible_collections/cisco/ise/plugins/modules/guest_type.py index 2318caaae..4ac0b34d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type.py @@ -120,7 +120,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py index 12b593e2f..9f386a62b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py index dcf1461ac..9a77176b1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py index d35072caa..08e88c869 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user.py b/ansible_collections/cisco/ise/plugins/modules/guest_user.py index a19118c76..f65ae8c24 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user.py @@ -115,7 +115,7 @@ options: description: Guest User's statusReason. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py index f5c0295f2..a8aa5dd45 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py index f26fe7649..0445a7379 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py index 454b982ae..5542a71ce 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py @@ -23,7 +23,7 @@ options: description: Guest User Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py index 64dc01930..701c53136 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py @@ -31,7 +31,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py index b02f5e41c..b4308026a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py index f0ba73a22..94fb4f6a2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py @@ -34,7 +34,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py index 651777e00..7713cb784 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py index 0ead09e64..36a8001e0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py @@ -24,7 +24,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py index b55a3147c..a544c1707 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py index d02bd0d38..1c9ffa411 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py @@ -23,7 +23,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py index e53ed5f2d..93c2e0d28 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py @@ -35,7 +35,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py index 90d37d154..ddc28f545 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py index d4cef09b0..143c1acad 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py @@ -25,7 +25,7 @@ options: description: Hotpatch Install's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py index d1ce43a88..7db0ae257 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py @@ -25,7 +25,7 @@ options: description: Hotpatch Rollback's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py index aa7f55914..f8047fc0c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py @@ -251,7 +251,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py index e2cbb7481..fe316031c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py index 259f25ae9..fa0906397 100644 --- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py @@ -48,7 +48,7 @@ options: description: Id Store Sequence's parent. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentitySequence diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py index 16e99cfb3..1903ae417 100644 --- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentitySequence diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group.py b/ansible_collections/cisco/ise/plugins/modules/identity_group.py index c9e017ada..13dfda39f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/identity_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/identity_group.py @@ -30,7 +30,7 @@ options: description: Identity Group's parent. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py index 460a381e5..c2acbc9d3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user.py b/ansible_collections/cisco/ise/plugins/modules/internal_user.py index 4769df6bb..238b344b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/internal_user.py +++ b/ansible_collections/cisco/ise/plugins/modules/internal_user.py @@ -69,7 +69,7 @@ options: description: The id store where the internal user's password is kept. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py index 7f90f3836..eb6da52de 100644 --- a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py index 2eb5f7e01..c61db07fd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py +++ b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py @@ -21,7 +21,7 @@ options: CSR. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py index f5cbe33a2..46a7b777d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py index 5f4f2067e..b594f90db 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py index 282279015..0ecf5b696 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py index 297121891..b224fdcc8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py @@ -34,7 +34,7 @@ options: description: Token. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py index 121e10383..d88e0e987 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py index 73c71772a..85dcd4876 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py index 0267753df..e82937305 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py index b48863dce..fe66204bd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py index a85e9ea20..11ef62dae 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py index f17ae2533..8a64d0eb2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py @@ -24,7 +24,7 @@ options: - Duration path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py index 6a6d498fd..fd9138adf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py @@ -28,7 +28,7 @@ options: - RECORDS path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py index fb1b30fb0..5a033a6c9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py @@ -28,7 +28,7 @@ options: - RECORDS path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py index 53e936d10..6ffa6c354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py index c2ffbff89..0a0bf0c25 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py index 352e09bf6..e62b3ef9b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py index 716b60cd0..44685ba33 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py index f908a7a69..ec45c8782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py @@ -20,7 +20,7 @@ options: - Endpoint_ipv4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py index 754aebbc8..d9a4bcfb3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py @@ -20,7 +20,7 @@ options: - Mac path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py index 09f23798e..d6f0fa959 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py @@ -20,7 +20,7 @@ options: - Nas_ipv4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py index 81c750499..548da9c6b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py @@ -20,7 +20,7 @@ options: - Username path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py index a9df0152d..63b7fa1aa 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py index 5f1be8c8f..8de5ed1d5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py @@ -36,7 +36,7 @@ options: - NAS_IPV4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py index 5c8869a93..774d9709a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py index 5a8db7deb..05494c7d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py index d0516ee47..9f1e55b73 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py @@ -28,7 +28,7 @@ options: - REAUTH_TYPE path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py index d614bab85..b00af3952 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py @@ -20,7 +20,7 @@ options: - Session_id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py index 7217600d6..c26efbd54 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py index bdec90ade..5677290f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py @@ -275,7 +275,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py index c0c1cd87a..742308c72 100644 --- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py index e34a702c8..c250782f3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py @@ -48,7 +48,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NativeSupplicantProfile diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py index f086ded1e..5976821cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NativeSupplicantProfile diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py index 33ea47623..4b3be685e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py @@ -21,6 +21,9 @@ options: id: description: Id path parameter. Rule id. type: str + identitySourceId: + description: Identity source id from the identity stores. + type: str identitySourceName: description: Identity source name from the identity stores. type: str @@ -56,6 +59,9 @@ options: condition: description: Network Access Authentication Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -102,11 +108,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authentication Rules's endDate. @@ -116,11 +123,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authentication Rules's endDate. @@ -140,8 +148,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authentication Rules's endTime. @@ -152,8 +160,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authentication Rules's endTime. @@ -221,7 +229,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules @@ -248,6 +256,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -259,6 +268,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +321,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present id: string + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -322,6 +333,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -385,6 +397,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -407,6 +420,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -462,6 +476,7 @@ ise_update_response: sample: > { "response": { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -484,6 +499,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py index a41243427..f121dc6f2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules @@ -73,6 +73,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -95,6 +96,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py index 1d4de88e7..e3e918c5f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py index 03b4c64bc..11cb7caff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py @@ -47,6 +47,9 @@ options: condition: description: Network Access Authorization Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -93,11 +96,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authorization Rules's endDate. @@ -107,11 +111,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authorization Rules's endDate. @@ -131,8 +136,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authorization Rules's endTime. @@ -143,8 +148,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authorization Rules's endTime. @@ -215,7 +220,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules @@ -251,6 +256,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -313,6 +319,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -398,6 +405,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -475,6 +483,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py index ec93647e4..6a5f812d3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules @@ -94,6 +94,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py index 55dfe008f..fc9311404 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py index 6321335dd..b5abc72da 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py @@ -20,6 +20,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -65,11 +68,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Conditions's endDate. @@ -79,11 +82,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Conditions's endDate. @@ -102,8 +105,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Conditions's endTime. @@ -113,8 +117,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Conditions's endTime. @@ -159,7 +164,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -190,6 +195,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -235,6 +241,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -289,6 +296,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -356,6 +364,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -414,6 +423,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py index bb37744f0..d1977079d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py index be93e370a..1c33ff340 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py index a8739b029..eb9d44889 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py index 79273501d..04f96b355 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py @@ -29,7 +29,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py index 161c04bc2..64b1abb37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py @@ -47,7 +47,7 @@ options: description: The dictionary version. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py index 4a029c5c9..2572d3833 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py @@ -55,7 +55,7 @@ options: description: The dictionary attribute's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attribute diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py index 92346b680..117323aac 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py @@ -27,7 +27,7 @@ options: - Name path parameter. The dictionary attribute name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attribute diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py index fc420dbf0..cf7b71905 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py index 88a0a1f00..7325147f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py index 4d82fae8f..07ac1479c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py index 4334d5172..7ddff701a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py @@ -23,7 +23,7 @@ options: - Name path parameter. The dictionary name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py index 67f0456d5..cb6eb3e48 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py @@ -44,6 +44,9 @@ options: condition: description: Network Access Global Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -90,11 +93,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Global Exception Rules's endDate. @@ -104,11 +108,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Global Exception Rules's endDate. @@ -128,8 +133,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Global Exception Rules's endTime. @@ -140,8 +145,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Global Exception Rules's endTime. @@ -212,7 +217,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules @@ -247,6 +252,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -308,6 +314,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -392,6 +399,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -469,6 +477,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py index 168ed354f..e98c99cb6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules @@ -88,6 +88,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py index 8047fc1d5..de070305f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py index 5bdc15cf7..50c59b392 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Identity Stores diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py index 8f88a5fa3..94bd67b35 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py @@ -47,6 +47,9 @@ options: condition: description: Network Access Local Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -93,11 +96,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Local Exception Rules's endDate. @@ -107,11 +111,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Local Exception Rules's endDate. @@ -131,8 +136,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Local Exception Rules's endTime. @@ -143,8 +148,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Local Exception Rules's endTime. @@ -215,7 +220,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules @@ -251,6 +256,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -313,6 +319,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -398,6 +405,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -475,6 +483,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py index d93c9bef2..572027db8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules @@ -94,6 +94,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py index 25751d4b6..a7e32207d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py index bbdfb592a..4cf768c5d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py @@ -64,17 +64,17 @@ options: type: str type: dict macAddrList: - description: <p>This field should contain Endstation MAC address, comma, and - Destination MAC addresses.<br> Each Max address must include twelve hexadecimal - digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn - or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>. + description: <p>This field should contain Endstation MAC address, comma, and Destination + MAC addresses.<br> Each Max address must include twelve hexadecimal digits using + formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br> + Line format - Endstation MAC,Destination MAC </p>. elements: str type: list name: description: Network Condition name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Network Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py index 8d4f5aef7..063585c97 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Network Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py index 5d7e27b0c..8e98f1cb8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py @@ -21,6 +21,9 @@ options: condition: description: Network Access Policy Set's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -66,11 +69,11 @@ options: additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Policy Set's endDate. @@ -80,11 +83,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Policy Set's endDate. @@ -103,8 +106,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Policy Set's endTime. @@ -114,8 +118,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Policy Set's endTime. @@ -205,7 +210,7 @@ options: matched. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set @@ -233,6 +238,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -292,6 +298,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -373,6 +380,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -447,6 +455,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py index eb1515840..7c5c9d535 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set @@ -79,6 +79,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py index 66f6b6ca2..ceda451e8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py index 74a8ea784..5c954e513 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Profiles diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py index 660fab707..bcb6d16c9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Security Groups diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py index 3bcb433ad..1f63e6c1c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Service Names diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py index 15d981449..efa5d901c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py @@ -18,6 +18,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -63,11 +66,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Time Date Conditions's endDate. @@ -77,11 +80,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Time Date Conditions's endDate. @@ -100,8 +103,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Time Date Conditions's endTime. @@ -111,8 +115,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Time Date Conditions's endTime. @@ -157,7 +162,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Time/Date Conditions @@ -184,6 +189,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -229,6 +235,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py index aa22bfe90..eb6ee1b0b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Time/Date Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device.py b/ansible_collections/cisco/ise/plugins/modules/network_device.py index 57a20dade..cde422c7a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device.py @@ -191,7 +191,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py index 7f8850311..8a766835d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py index 0489df3c0..530df579b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py @@ -23,7 +23,7 @@ options: description: Network Device Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py index 12515718d..d2c17dd56 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py @@ -27,11 +27,11 @@ options: name: description: Network Device Group's name. type: str - othername: - description: Network Device Group's othername. + ndgtype: + description: Network Device Group's ndgtype. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -57,7 +57,7 @@ EXAMPLES = r""" description: string id: string name: string - othername: string + ndgtype: string - name: Delete by id cisco.ise.network_device_group: @@ -77,7 +77,7 @@ EXAMPLES = r""" state: present description: string name: string - othername: string + ndgtype: string """ @@ -96,7 +96,7 @@ ise_response: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ise_update_response: diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py index f729d6e40..757237f1d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py @@ -73,7 +73,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -138,7 +138,7 @@ ise_response: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ise_responses: @@ -158,7 +158,7 @@ ise_responses: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ] """ diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py index 95ef6fce3..36505fec4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py index 4af07b070..237154029 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py @@ -42,7 +42,7 @@ options: description: Node Deployment's userName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py index 76363516c..86af43a84 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py @@ -49,7 +49,7 @@ options: - Hostname path parameter. Hostname of the deployed node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py index 5d3d60c9d..fd2e3ecca 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py @@ -20,7 +20,7 @@ options: description: Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group.py b/ansible_collections/cisco/ise/plugins/modules/node_group.py index 8e28165f3..04fcc0f7d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group.py @@ -52,7 +52,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py index ee2f50ae4..4fbf7af0f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py @@ -23,7 +23,7 @@ options: - NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py index f57f5233b..6a70be798 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py @@ -23,7 +23,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py index 0097d0c8a..84fc6b947 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py @@ -23,7 +23,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py index 46ed0b9e2..a2fbd4294 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py @@ -21,7 +21,7 @@ options: - NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_info.py index e0ca47517..92e80d782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_info.py @@ -63,7 +63,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NodeDetails diff --git a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py index e83c1922a..a9d2c776f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py index c3c0bf922..8c6582275 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py @@ -19,7 +19,7 @@ options: description: Node Promotion's promotionType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py index 86c442d19..430ddc187 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py @@ -20,7 +20,7 @@ options: - Node path parameter. ID of the existing node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py index 236082dc5..f837ebfe1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py index 893da855f..15d3d06b2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py index b47eff3a2..1307411ce 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py @@ -140,7 +140,7 @@ options: type: int type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py index 106563972..c65326de2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py index af5961ad1..fc29dc3e5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py @@ -23,7 +23,7 @@ options: description: Node Services SXP Interfaces's interface. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py index fdd2716d0..3c2f925d9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py index c397cb326..67160219b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_sync.py index e45a0ae17..7389635e4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_sync.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_sync.py @@ -19,7 +19,7 @@ options: description: Node Sync's hostname. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py index 0a33b80f7..3029954f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py @@ -31,7 +31,7 @@ options: description: Pan Ha's secondaryHealthCheckNode. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py index 6a6ae62b4..3061000ca 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py @@ -20,7 +20,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PAN HA diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py index 6f0526a0f..9a8b048b2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py @@ -42,7 +42,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PAN HA diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_info.py b/ansible_collections/cisco/ise/plugins/modules/patch_info.py index ec427e641..ba13a4851 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_install.py b/ansible_collections/cisco/ise/plugins/modules/patch_install.py index 94d41ea7e..d2a1bfc92 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_install.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_install.py @@ -25,7 +25,7 @@ options: description: Patch Install's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py index f82dc23d3..2838048f8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py @@ -22,7 +22,7 @@ options: description: Patch Rollback's patchNumber. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py index 5c3e74e18..af332d5c2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py @@ -23,7 +23,7 @@ options: description: Portal Global Setting's id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py index e0bc9c260..ae481c4a3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_info.py index 315df0838..2d9654517 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py index f20992749..8554639f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py @@ -31,7 +31,7 @@ options: description: Portal Theme for all portals. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py index eaa5a691e..bc1fb3884 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py index be32314da..9ddd192b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py index 92f4ad27d..a4bb5b688 100644 --- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py @@ -35,7 +35,7 @@ options: description: User name for the proxy connection. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for proxy diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py index d14440bd3..989e22add 100644 --- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for proxy diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py index 172dab5fd..8cb0c132b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py index a620e17c3..bac63eb41 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py index 43f0e9570..7241dcd52 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py index 886991e98..e87b41303 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py @@ -23,7 +23,7 @@ options: description: Auto approve certificate based accounts when true. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py index dca5b999a..358d777f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py @@ -19,7 +19,7 @@ options: description: pxGrid Access Secret's peerNodeName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py index 8e2571b08..bcb84e34a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py @@ -19,7 +19,7 @@ options: description: pxGrid Account Activate's description. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py index 4de7c8682..83a6b2f8a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py @@ -19,7 +19,7 @@ options: description: pxGrid Account Create's nodeName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py index 7eaf7442e..13022cd27 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py index 9a27324c0..d7d05cf37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py index 33b2e21e8..2e6450f32 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py index 38f89a6a6..b2024371d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py index 49bcc5e50..55e255bc3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py index 15a6ff349..a9c6fa00f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py index bdedd95d3..ef1ddf642 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py index eec046210..9224eb08e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py index 475b9224d..dc552be6d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py index d247161bb..f5963ddf2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py index c58e44198..f808e5cc7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py index 5248f7a1c..16c42889c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py index 19f716365..5da12013d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py index 9f14887ec..f9a4767c1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py index 94944e789..687581cea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py index b003c9148..c41be5560 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py index dd6867c42..2abc51e1e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py index 5787aecb0..755a1231f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py @@ -19,7 +19,7 @@ options: description: pxGrid Service Lookup's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py index c78f2df86..4484573af 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py @@ -19,7 +19,7 @@ options: description: pxGrid Service Register's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py index a79a00ddb..b91798631 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py index f0316a4fd..3926a9960 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py index 6260c36ec..df9720cb7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py index 6ddea6645..56a5e9204 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py index c9b3c9751..6e3ca80eb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py index bf910ac3e..9f0305ab6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py index fb1b90ca8..3203ed0b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py @@ -23,7 +23,7 @@ options: description: Auto approve certificate based accounts when true. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py index a7667adb8..e3b54fa92 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py index 407c42f89..3add71347 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py index 6bf112bd0..8031470a4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py @@ -103,7 +103,7 @@ options: description: UseAttrSetOnRequest flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py index 91097fdd8..1073928ea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py index d91ea35b4..a4561a02b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py @@ -20,7 +20,7 @@ options: description: Renew Certificate's certType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/repository.py b/ansible_collections/cisco/ise/plugins/modules/repository.py index a9236c8f8..635d1d464 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository.py @@ -45,7 +45,7 @@ options: description: Username may contain alphanumeric and _-./@\\$ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py index c70d8b7b6..32f628688 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py @@ -21,7 +21,7 @@ options: - RepositoryName path parameter. Unique name for a repository. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_info.py index 524e63a96..6631f499b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository_info.py @@ -23,7 +23,7 @@ options: - RepositoryName path parameter. Unique name for a repository. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py index b8989b7be..826afa9c8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py @@ -21,7 +21,7 @@ options: - Resource path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py index f39aaf8d9..a91c0b4f8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py +++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py @@ -48,6 +48,14 @@ options: description: Suffix of the username domain. type: str type: dict + ersRESTIDStoreUserAttributes: + description: REST Id Store's ersRESTIDStoreUserAttributes. + suboptions: + attributes: + description: REST Id Store's attributes. + elements: str + type: list + type: dict id: description: REST Id Store's id. type: str @@ -55,7 +63,7 @@ options: description: REST Id Store's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.0.1 - python >= 3.5 notes: - SDK Method used are @@ -144,6 +152,9 @@ EXAMPLES = r""" predefined: string rootUrl: string usernameSuffix: string + ersRestIDStoreUserAttributes: + attributes: + - string name: string """ diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py index f9d5a1cd7..07a3b19e2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py index a7b264ffa..81b396660 100644 --- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py @@ -682,7 +682,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SelfRegisteredPortal diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py index 42d009798..5d1952ed7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SelfRegisteredPortal diff --git a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py index eecd7b549..84be20739 100644 --- a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py +++ b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py @@ -119,7 +119,7 @@ options: description: Certificate state (ST). type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py index 59be20e3d..8d531833a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PsnNodeDetailsWithRadiusService diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py index ba6fd695f..8f6d53354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py @@ -43,7 +43,7 @@ options: description: SGACL's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py index d23f90b52..814837559 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py index 7ffae3189..79dd73025 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py @@ -23,7 +23,7 @@ options: description: SGACL Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py index 3ea64a8bf..b3c4cae7c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py index 8bd08e3aa..9d27da3cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py @@ -44,7 +44,7 @@ options: description: Mandatory unless mappingGroup is set. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py index 6814106ac..c0988da7c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py index aa8d7f738..c3298c551 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG Mapping Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py index d40159d18..97b9c2368 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py index 20686b4ca..317037a5b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py index 605873b86..40a7adb84 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py index 2f20a7967..6b6d7fcd0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py @@ -34,7 +34,7 @@ options: description: Mandatory unless mappingGroup is set. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py index 856788bf7..cd6af8a56 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py index f8f97da73..18ed1150d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG Mapping Group Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py index 2b35f9ba2..1012ababc 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py index 666c65d77..08b7223e2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py index 3f3cf6adf..f02d6260a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py index 725b00d80..c05b582ff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py index 3ebb64ac7..cc46a2d6a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py index 4fb8805fc..bba7eeb3a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py @@ -71,7 +71,7 @@ options: type: list type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py index b97da0a72..ceebe7245 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py index 958cf4055..c466ec4a7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG To VN To VLAN Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py index 18394741f..5759bcbdf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py @@ -57,7 +57,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt.py b/ansible_collections/cisco/ise/plugins/modules/sgt.py index c7d7e013b..7d65c2e9a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt.py @@ -46,7 +46,7 @@ options: type: int required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py index f8776d485..29ffa4038 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py index c295c10b8..6afae3073 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py @@ -23,7 +23,7 @@ options: description: SGt Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py index 0e483e947..98190f097 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py index 6b6beed7c..38175a56e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py @@ -59,7 +59,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py index e684f9371..be39a7e2c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py @@ -120,7 +120,7 @@ options: type: bool type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py index b6892c6fa..88e4f9599 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py index c49c76f41..4d782aa71 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py @@ -59,7 +59,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py index 22b53b5fa..6acb22f0f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py @@ -281,7 +281,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py index 8fafce1d2..9c51373f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py index 85f386446..e8f99c386 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py @@ -385,7 +385,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py index d4e2649a6..017236454 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber.py b/ansible_collections/cisco/ise/plugins/modules/subscriber.py new file mode 100644 index 000000000..e62fe2c55 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber.py @@ -0,0 +1,150 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber +short_description: Resource module for Subscriber +description: +- Manage operations create, update and delete of the resource Subscriber. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + enabled: + description: Subscriber is enabled or not. + type: bool + friendlyName: + description: Friendly name for the subscriber. + type: str + identityGroups: + description: Identity Group(s). With more than one idGroups it needs to be comma + seperated. + type: str + imeis: + description: IMEI to be attached to the subscriber. + type: str + imsi: + description: IMSI for Subscriber. + type: str + ki: + description: KI. + type: str + opc: + description: OPC. + type: str + subscriberId: + description: SubscriberId path parameter. Unique id for a subscriber object. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.create_subscriber, + subscriber.Subscriber.delete_subscriber, + subscriber.Subscriber.update_subscriber, + + - Paths used are + post /api/v1/fiveg/subscriber, + delete /api/v1/fiveg/subscriber/{subscriberId}, + put /api/v1/fiveg/subscriber/{subscriberId}, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enabled: true + friendlyName: string + identityGroups: string + imeis: string + imsi: string + ki: string + opc: string + +- name: Update by id + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enabled: true + friendlyName: string + identityGroups: string + imeis: string + ki: string + opc: string + subscriberId: string + +- name: Delete by id + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: absent + subscriberId: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "response": { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py new file mode 100644 index 000000000..2b6547097 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py @@ -0,0 +1,92 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber_bulk +short_description: Resource module for Subscriber Bulk +description: +- Manage operation create of the resource Subscriber Bulk. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + ItemList: + description: Subscriber Bulk's ItemList. + elements: dict + suboptions: + enabled: + description: Subscriber is enabled or not. + type: bool + friendlyName: + description: Friendly name for the subscriber. + type: str + id: + description: Subscriber Bulk's id. + type: str + identityGroups: + description: Identity Group(s). With more than one idGroups it needs to be comma + seperated. + type: str + imeis: + description: Comma separated IMEIs to be attached to the subscriber. + type: str + imsi: + description: IMSI for Subscriber. + type: str + ki: + description: KI. + type: str + opc: + description: OPC. + type: str + type: list + operation: + description: Subscriber Bulk's operation. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.bulk_subscriber_operation, + + - Paths used are + post /api/v1/fiveg/subscriber/bulk, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.subscriber_bulk: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + ItemList: + - enabled: true + friendlyName: string + id: string + identityGroups: string + imeis: string + imsi: string + ki: string + opc: string + operation: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "id": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py new file mode 100644 index 000000000..4da62a78f --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py @@ -0,0 +1,69 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber_imsi_info +short_description: Information module for Subscriber Imsi Info +description: +- Get Subscriber Imsi Info by id. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: + imsi: + description: + - Imsi path parameter. IMSI parameter. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.get_subscriber_by_i_m_s_i, + + - Paths used are + get /api/v1/fiveg/subscriber/imsi/{imsi}, + +""" + +EXAMPLES = r""" +- name: Get Subscriber Imsi Info by id + cisco.ise.subscriber_imsi_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + imsi: string + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py index 7c877bc3c..660937786 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py @@ -6,14 +6,12 @@ DOCUMENTATION = r""" --- -module: trustsec_vn_info -short_description: Information module for Trustsec VN +module: subscriber_info +short_description: Information module for Subscriber description: -- Get all Trustsec VN. -- Get Trustsec VN by id. -- Get Virtual Network by id. -- Get all Virtual Networks. -version_added: '2.0.0' +- Get all Subscriber. +- Get Subscriber by id. +version_added: '2.8.0' extends_documentation_fragment: - cisco.ise.module_info author: Rafael Campos (@racampos) @@ -26,14 +24,6 @@ options: description: - Size query parameter. Number of objects returned per page. type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str filter: description: - > @@ -52,58 +42,61 @@ options: - The 'NENDSW' operator describes 'Not Ends With'. - The 'CONTAINS' operator describes 'Contains'. - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list + type: str filterType: description: - > FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and can be changed by using the parameter. type: str - id: + sort: + description: + - Sort query parameter. Sort type - asc or desc. + type: str + sortBy: + description: + - SortBy query parameter. Sort column by which objects needs to be sorted. + type: str + subscriberId: description: - - Id path parameter. + - SubscriberId path parameter. Unique id for a subscriber object. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.0.1 - python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi notes: - SDK Method used are - virtual_network.VirtualNetwork.get_virtual_network_by_id, - virtual_network.VirtualNetwork.get_virtual_networks_generator, + subscriber.Subscriber.get_all_subscribers_generator, + subscriber.Subscriber.get_subscriber_by_id, - Paths used are - get /api/v1/trustsec/virtualnetwork, - get /api/v1/trustsec/virtualnetwork/{id}, + get /api/v1/fiveg/subscriber, + get /api/v1/fiveg/subscriber/{subscriberId}, """ EXAMPLES = r""" -- name: Get all Trustsec VN - cisco.ise.trustsec_vn_info: +- name: Get all Subscriber + cisco.ise.subscriber_info: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" page: 0 size: 0 + filter: string + filterType: string sort: string sortBy: string - filter: [] - filterType: string register: result -- name: Get Trustsec VN by id - cisco.ise.trustsec_vn_info: +- name: Get Subscriber by id + cisco.ise.subscriber_info: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" - id: string + subscriberId: string register: result """ @@ -112,17 +105,25 @@ RETURN = r""" ise_response: description: A dictionary or list with the response returned by the Cisco ISE Python SDK returned: always - type: list - elements: dict + type: dict sample: > - [ - { - "additionalAttributes": "string", - "id": "string", - "lastUpdate": "string", - "name": "string" - } - ] + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } ise_responses: description: A dictionary or list with the response returned by the Cisco ISE Python SDK @@ -132,10 +133,21 @@ ise_responses: sample: > [ { - "additionalAttributes": "string", + "createTime": "string", + "enabled": true, + "friendlyName": "string", "id": "string", - "lastUpdate": "string", - "name": "string" + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" } ] """ diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py index 81aaf5bf6..cd29a5b31 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py @@ -57,7 +57,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SupportBundleTriggerConfiguration diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py index c6b8b4635..952d9fcf3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py @@ -29,7 +29,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py index 0cdb8aaf9..67fd177d2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py index 544a65b80..53a6ec262 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py @@ -46,7 +46,7 @@ options: description: SXP Connections's sxpVpn. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py index bfa5183c0..dfcbb8eb2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py index 02ca9ce03..3e62f2782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP Connections Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py index 08a50da5f..42e979779 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py index 5eff2ab4e..a403670fd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py @@ -42,7 +42,7 @@ options: or vns should be defined. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py index 3cb621af3..f34f4741c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py index 374def105..66b5e0ab1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP Local Bindings Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py index 0c422a495..15aeaf5e3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py index 0b7a88dce..abab51624 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py @@ -24,7 +24,7 @@ options: description: SXP VPNs's sxpVpnName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py index 9ec5a6fbc..d749941ab 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py index 0c8e957c6..0d24fbc94 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP VPNs Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py index 0b233c134..4fffbfc4a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py @@ -65,7 +65,7 @@ options: - Sortdsc query parameter. Sort desc. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py index 6022b8d32..f2dd7a73b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py @@ -78,7 +78,7 @@ options: description: Use certificate for SAML Signing. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py index 758318611..916142bb3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py @@ -88,7 +88,7 @@ options: description: NodeId of Cisco ISE application. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py index 793eaea33..e53c17a3a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py @@ -35,7 +35,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py index 9cb9d3301..72f69d078 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py @@ -81,7 +81,7 @@ options: description: Validate certificate extensions. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py index 9c05839cb..7d90d10d4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py @@ -69,7 +69,7 @@ options: - Id path parameter. ID of the system certificate. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py index cbff1e720..2213574f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for VersionAndPatch diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py index 461d03bda..af3075c13 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py @@ -49,7 +49,7 @@ options: description: PermitUnmatched flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py index 59398596d..4aa4f9be9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py index 51d311bf0..2d724e764 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py @@ -43,7 +43,7 @@ options: description: The server timeout. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py index 5759de015..d097fcf25 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py index 8cb53b9be..304caaabd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py @@ -46,7 +46,7 @@ options: type: list type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py index a64d0f257..59f1495f6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py index 0f9669f0f..e26adf0ae 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py @@ -50,7 +50,7 @@ options: description: Define if a delimiter will be used for suffix strip. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py index 618b4c59f..69d4424b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py index 98dabd3dc..b038c6e9d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py @@ -21,7 +21,7 @@ options: - TaskId path parameter. The id of the task executed before. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for tasks diff --git a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py index 4393577aa..089d885d1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py @@ -57,7 +57,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for TelemetryInformation diff --git a/ansible_collections/cisco/ise/plugins/modules/test_connector.py b/ansible_collections/cisco/ise/plugins/modules/test_connector.py new file mode 100644 index 000000000..4caaadc4b --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/test_connector.py @@ -0,0 +1,87 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: test_connector +short_description: Resource module for Test Connector +description: +- Manage operation create of the resource Test Connector. +- EDDA - test the Connector. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + authType: + description: Authentication Type list. + type: str + authValues: + description: Request to test Connector. + suboptions: + password: + description: Password. + type: str + userName: + description: UserName. + type: str + type: dict + connectorName: + description: ConnectorName. + type: str + responseParsing: + description: Uniqueness to identify. + type: str + uniqueID: + description: Uniqueness to identify. + type: str + url: + description: BulkUrl. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.test_connector, + + - Paths used are + post /api/v1/edda/test-connector, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.test_connector: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + authType: string + authValues: + password: string + userName: string + connectorName: string + responseParsing: string + uniqueID: string + url: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connectorName": "string", + "data": "string", + "error": "string", + "status": "string", + "uniqueID": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py index 853c23ade..6288b13c6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py +++ b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py @@ -20,7 +20,7 @@ options: description: Threat Vulnerabilities Clear's macAddresses. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for ClearThreatsAndVulnerabilities diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py index 1db63b6e8..9b7012f3b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py @@ -23,7 +23,7 @@ options: description: URL of transport gateway. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for telemetry diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py index a5f69c026..404d01827 100644 --- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for telemetry diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py index d93fd1dee..abe3948a5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py @@ -91,7 +91,7 @@ options: description: Trust for authentication within Cisco ISE. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py index 7912ff872..640dffb3b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py @@ -10,7 +10,7 @@ module: trusted_certificate_export_info short_description: Information module for Trusted Certificate Export description: - Get Trusted Certificate Export by id. -- The response of this API carries a trusted certificate file mapped to the. +- The response of this API carries a trusted certificate file mapped to the requested ID. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module_info @@ -33,7 +33,7 @@ options: - The filename used to save the download file. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py index 795ddb27c..a03c7d41d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py @@ -50,7 +50,7 @@ options: description: Validate trust certificate extension. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py index fceb4f0ca..198e0539b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py @@ -65,7 +65,7 @@ options: - Id path parameter. ID of the trust certificate. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py deleted file mode 100644 index d82685f21..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py +++ /dev/null @@ -1,130 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_nbar_app -short_description: Resource module for Trustsec NBAR App -description: -- Manage operations create, update and delete of the resource Trustsec NBAR App. -- Create NBAR application. -- Update NBAR Application. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - description: - description: Trustsec NBAR App's description. - type: str - id: - description: Trustsec NBAR App's id. - type: str - name: - description: Trustsec NBAR App's name. - type: str - networkIdentities: - description: Array of NIs. - elements: dict - suboptions: - ports: - description: Trustsec NBAR App's ports. - type: str - protocol: - description: Trustsec NBAR App's protocol. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for nbarApp - description: Complete reference of the nbarApp API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - nbar_app.NbarApp.create_nbar_app, - nbar_app.NbarApp.delete_nbar_app_by_id, - nbar_app.NbarApp.update_nbar_app_by_id, - - - Paths used are - post /api/v1/trustsec/sgacl/nbarapp, - delete /api/v1/trustsec/sgacl/nbarapp/{id}, - put /api/v1/trustsec/sgacl/nbarapp/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - description: string - id: string - name: string - networkIdentities: - - ports: string - protocol: string - -- name: Update by id - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - description: string - id: string - name: string - networkIdentities: - - ports: string - protocol: string - -- name: Delete by id - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py deleted file mode 100644 index 9c2b732b9..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py +++ /dev/null @@ -1,151 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_nbar_app_info -short_description: Information module for Trustsec NBAR App -description: -- Get all Trustsec NBAR App. -- Get Trustsec NBAR App by id. -- Get NBAR Application by id. -- Get all NBAR Applications. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for nbarApp - description: Complete reference of the nbarApp API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - nbar_app.NbarApp.get_nbar_app_by_id, - nbar_app.NbarApp.get_nbar_apps_generator, - - - Paths used are - get /api/v1/trustsec/sgacl/nbarapp, - get /api/v1/trustsec/sgacl/nbarapp/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec NBAR App - cisco.ise.trustsec_nbar_app_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec NBAR App by id - cisco.ise.trustsec_nbar_app_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py deleted file mode 100644 index b9c65804b..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py +++ /dev/null @@ -1,130 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping -short_description: Resource module for Trustsec SG VN Mapping -description: -- Manage operations create, update and delete of the resource Trustsec SG VN Mapping. -- Create Security Group and Virtual Network mapping. -- Delete Security Group and Virtual Network mapping. -- Update Security Group and Virtual Network mapping. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if id - is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required unless - its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity if id - is not provided. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.create_sg_vn_mapping, - sg_vn_mapping.SgVnMapping.delete_sg_vn_mapping_by_id, - sg_vn_mapping.SgVnMapping.update_sg_vn_mapping_by_id, - - - Paths used are - post /api/v1/trustsec/sgvnmapping, - delete /api/v1/trustsec/sgvnmapping/{id}, - put /api/v1/trustsec/sgvnmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -- name: Update by id - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -- name: Delete by id - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py deleted file mode 100644 index 2adb8f02a..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py +++ /dev/null @@ -1,87 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_create -short_description: Resource module for Trustsec SG VN Mapping Bulk Create -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Create's payload. - elements: dict - suboptions: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if - id is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_create_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py deleted file mode 100644 index b5d8b48de..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py +++ /dev/null @@ -1,59 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_delete -short_description: Resource module for Trustsec SG VN Mapping Bulk Delete -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Delete. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Delete's payload. - elements: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_delete_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/delete, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_delete: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py deleted file mode 100644 index 05b1a97e3..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py +++ /dev/null @@ -1,87 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_update -short_description: Resource module for Trustsec SG VN Mapping Bulk Update -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Update's payload. - elements: dict - suboptions: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if - id is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_update_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py deleted file mode 100644 index 3ac8cb0c9..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py +++ /dev/null @@ -1,145 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_info -short_description: Information module for Trustsec SG VN Mapping -description: -- Get all Trustsec SG VN Mapping. -- Get Trustsec SG VN Mapping by id. -- Get Security Group and Virtual Network mapping by id. -- Get all Security Group and Virtual Network mappings. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.get_sg_vn_mapping_by_id, - sg_vn_mapping.SgVnMapping.get_sg_vn_mappings_generator, - - - Paths used are - get /api/v1/trustsec/sgvnmapping, - get /api/v1/trustsec/sgvnmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec SG VN Mapping - cisco.ise.trustsec_sg_vn_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec SG VN Mapping by id - cisco.ise.trustsec_sg_vn_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py deleted file mode 100644 index 7bd274ee2..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py +++ /dev/null @@ -1,113 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn -short_description: Resource module for Trustsec VN -description: -- Manage operations create, update and delete of the resource Trustsec VN. -- Create Virtual Network. -- Update Virtual Network. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.create_virtual_network, - virtual_network.VirtualNetwork.delete_virtual_network_by_id, - virtual_network.VirtualNetwork.update_virtual_network_by_id, - - - Paths used are - post /api/v1/trustsec/virtualnetwork, - delete /api/v1/trustsec/virtualnetwork/{id}, - put /api/v1/trustsec/virtualnetwork/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - additionalAttributes: string - id: string - lastUpdate: string - name: string - -- name: Update by id - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - additionalAttributes: string - id: string - lastUpdate: string - name: string - -- name: Delete by id - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "additionalAttributes": "string", - "id": "string", - "lastUpdate": "string", - "name": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py deleted file mode 100644 index 3893db42a..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py +++ /dev/null @@ -1,75 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_bulk_create -short_description: Resource module for Trustsec VN Bulk Create -description: -- Manage operation create of the resource Trustsec VN Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN Bulk Create's payload. - elements: dict - suboptions: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.bulk_create_virtual_networks, - - - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - additionalAttributes: string - id: string - lastUpdate: string - name: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py deleted file mode 100644 index c823d303c..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py +++ /dev/null @@ -1,75 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_bulk_update -short_description: Resource module for Trustsec VN Bulk Update -description: -- Manage operation create of the resource Trustsec VN Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN Bulk Update's payload. - elements: dict - suboptions: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.bulk_update_virtual_networks, - - - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - additionalAttributes: string - id: string - lastUpdate: string - name: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py deleted file mode 100644 index 712c562be..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py +++ /dev/null @@ -1,139 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping -short_description: Resource module for Trustsec VN VLAN Mapping -description: -- Manage operations create, update and delete of the resource Trustsec VN VLAN Mapping. -- Create VN-Vlan Mapping. -- Update VN-Vlan Mapping. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required unless - its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity if id - is not provided. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.create_vn_vlan_mapping, - vn_vlan_mapping.VnVlanMapping.delete_vn_vlan_mapping_by_id, - vn_vlan_mapping.VnVlanMapping.update_vn_vlan_mapping_by_id, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping, - delete /api/v1/trustsec/vnvlanmapping/{id}, - put /api/v1/trustsec/vnvlanmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -- name: Update by id - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -- name: Delete by id - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py deleted file mode 100644 index bbe8e5980..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py +++ /dev/null @@ -1,93 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_create -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Create -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Create's payload. - elements: dict - suboptions: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_create_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py deleted file mode 100644 index 88a6c1e34..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py +++ /dev/null @@ -1,59 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_delete -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Delete -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Delete. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Delete's payload. - elements: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_delete_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/delete, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_delete: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py deleted file mode 100644 index e99b6f6d5..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py +++ /dev/null @@ -1,93 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_update -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Update -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Update's payload. - elements: dict - suboptions: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_update_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py deleted file mode 100644 index c6047e4ee..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py +++ /dev/null @@ -1,149 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_info -short_description: Information module for Trustsec VN VLAN Mapping -description: -- Get all Trustsec VN VLAN Mapping. -- Get Trustsec VN VLAN Mapping by id. -- Get VN-Vlan Mapping by id. -- Get all VN-Vlan Mappings. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mapping_by_id, - vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mappings_generator, - - - Paths used are - get /api/v1/trustsec/vnvlanmapping, - get /api/v1/trustsec/vnvlanmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec VN VLAN Mapping - cisco.ise.trustsec_vn_vlan_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec VN VLAN Mapping by id - cisco.ise.trustsec_vn_vlan_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py index 2a2dce924..fbb0843c2 100644 --- a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py +++ b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py @@ -13,7 +13,7 @@ except ImportError: ISE_SDK_IS_INSTALLED = False else: ISE_SDK_IS_INSTALLED = True -from ansible.module_utils.basic import AnsibleModule, env_fallback +from ansible.module_utils.basic import env_fallback try: from ansible.errors import AnsibleActionFail @@ -133,11 +133,12 @@ def ise_argument_spec(): ise_username=dict(type="str", fallback=(env_fallback, ['ISE_USERNAME']), required=True), ise_password=dict(type="str", fallback=(env_fallback, ['ISE_PASSWORD']), required=True, no_log=True), ise_verify=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_VERIFY'])), - ise_version=dict(type="str", default="3.1_Patch_1", fallback=(env_fallback, ['ISE_VERSION'])), + ise_version=dict(type="str", default="3.2_beta", fallback=(env_fallback, ['ISE_VERSION'])), ise_wait_on_rate_limit=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_WAIT_ON_RATE_LIMIT'])), ise_uses_api_gateway=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_USES_API_GATEWAY'])), ise_uses_csrf_token=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_USES_CSRF_TOKEN'])), ise_debug=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_DEBUG'])), + ise_single_request_timeout=dict(type="int", default=60, fallback=(env_fallback, ['ISE_SINGLE_REQUEST_TIMEOUT'])), ) return argument_spec @@ -172,6 +173,7 @@ class ISESDK(object): ers_base_url=ers_base_url, mnt_base_url=mnt_base_url, px_grid_base_url=px_grid_base_url, + single_request_timeout=params.get("ise_single_request_timeout"), verify=params.get("ise_verify"), version=params.get("ise_version"), wait_on_rate_limit=params.get("ise_wait_on_rate_limit"), diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py index 1f30a10c7..6fb4e2744 100644 --- a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py +++ b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py @@ -144,7 +144,7 @@ class Node(object): try: response = requests.post(url=url, timeout=15, data=data, headers=headers, auth=(self.username, self.password), verify=False) except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if not response.status_code == 200: raise AnsibleActionFail("Received status code {status_code} when exporting certificate.".format(status_code=str(response.status_code))) @@ -175,7 +175,7 @@ class Node(object): ) return_message = json.loads(response.text)["response"]["message"] except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if not response.status_code == 200: if not (return_message == 'Trust certificate was added successfully' or |