mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
parent
d5b3ffc51e
commit
e16490c9c0
2 changed files with 607 additions and 0 deletions
390
lib/ansible/modules/network/meraki/meraki_admin.py
Normal file
390
lib/ansible/modules/network/meraki/meraki_admin.py
Normal file
|
@ -0,0 +1,390 @@
|
|||
#!/usr/bin/python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
# Copyright: (c) 2018, Kevin Breit (@kbreit) <kevin.breit@kevinbreit.net>
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
ANSIBLE_METADATA = {
|
||||
'metadata_version': '1.1',
|
||||
'status': ['preview'],
|
||||
'supported_by': 'community'
|
||||
}
|
||||
|
||||
DOCUMENTATION = r'''
|
||||
---
|
||||
module: meraki_admin
|
||||
short_description: Manage administrators in the Meraki cloud
|
||||
version_added: '2.6'
|
||||
description:
|
||||
- Allows for creation, management, and visibility into administrators within Meraki.
|
||||
notes:
|
||||
- More information about the Meraki API can be found at U(https://dashboard.meraki.com/api_docs).
|
||||
- Some of the options are likely only used for developers within Meraki.
|
||||
options:
|
||||
name:
|
||||
description:
|
||||
- Name of the dashboard administrator.
|
||||
- Required when creating a new administrator.
|
||||
email:
|
||||
description:
|
||||
- Email address for the dashboard administrator.
|
||||
- Email cannot be updated.
|
||||
- Required when creating or editing an administrator.
|
||||
orgAccess:
|
||||
description:
|
||||
- Privileges assigned to the administrator in the organization.
|
||||
choices: [ full, none, read-only ]
|
||||
tags:
|
||||
description:
|
||||
- Tags the administrator has privileges on.
|
||||
- When creating a new administrator, C(org_name), C(network), or C(tags) must be specified.
|
||||
- If C(none) is specified, C(network) or C(tags) must be specified.
|
||||
networks:
|
||||
description:
|
||||
- List of networks the administrator has privileges on.
|
||||
- When creating a new administrator, C(org_name), C(network), or C(tags) must be specified.
|
||||
state:
|
||||
description:
|
||||
- Create or modify an organization
|
||||
choices: [ absent, present, query ]
|
||||
required: true
|
||||
org_name:
|
||||
description:
|
||||
- Name of organization.
|
||||
- Used when C(name) should refer to another object.
|
||||
- When creating a new administrator, C(org_name), C(network), or C(tags) must be specified.
|
||||
aliases: ['organization']
|
||||
org_id:
|
||||
description:
|
||||
- ID of organization.
|
||||
author:
|
||||
- Kevin Breit (@kbreit)
|
||||
extends_documentation_fragment: meraki
|
||||
'''
|
||||
|
||||
EXAMPLES = r'''
|
||||
- name: Query information about all administrators associated to the organization
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: query
|
||||
delegate_to: localhost
|
||||
|
||||
- name: Query information about a single administrator by name
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: query
|
||||
name: Jane Doe
|
||||
|
||||
- name: Query information about a single administrator by email
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: query
|
||||
email: jane@doe.com
|
||||
|
||||
- name: Create a new administrator with organization access
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: present
|
||||
name: Jane Doe
|
||||
orgAccess: read-only
|
||||
email: jane@doe.com
|
||||
|
||||
- name: Create a new administrator with organization access
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: present
|
||||
name: Jane Doe
|
||||
orgAccess: read-only
|
||||
email: jane@doe.com
|
||||
|
||||
- name: Revoke access to an organization for an administrator
|
||||
meraki_admin:
|
||||
auth_key: abc12345
|
||||
state: absent
|
||||
email: jane@doe.com
|
||||
'''
|
||||
|
||||
RETURN = r'''
|
||||
data:
|
||||
description: Information about the created or manipulated object.
|
||||
returned: info
|
||||
type: list
|
||||
sample:
|
||||
[
|
||||
{
|
||||
"email": "john@doe.com",
|
||||
"id": "12345677890",
|
||||
"name": "John Doe",
|
||||
"networks": [],
|
||||
"orgAccess": "full",
|
||||
"tags": []
|
||||
}
|
||||
]
|
||||
changed:
|
||||
description: Whether object changed as a result of the request.
|
||||
returned: info
|
||||
type: string
|
||||
sample:
|
||||
"changed": false
|
||||
|
||||
status:
|
||||
description: HTTP response code
|
||||
returned: info
|
||||
type: int
|
||||
sample:
|
||||
"status": 200
|
||||
|
||||
response:
|
||||
description: HTTP response description and bytes
|
||||
returned: info
|
||||
type: string
|
||||
sample:
|
||||
"response": "OK (unknown bytes)"
|
||||
|
||||
failed:
|
||||
description: Boolean value whether the task failed
|
||||
returned: info
|
||||
type: bool
|
||||
sample:
|
||||
"failed": false
|
||||
'''
|
||||
|
||||
import os
|
||||
from ansible.module_utils.basic import AnsibleModule, json, env_fallback
|
||||
from ansible.module_utils.urls import fetch_url
|
||||
from ansible.module_utils._text import to_native
|
||||
from ansible.module_utils.network.meraki.meraki import MerakiModule, meraki_argument_spec
|
||||
|
||||
|
||||
def get_admins(meraki, org_id):
|
||||
admins = meraki.request(
|
||||
meraki.construct_path(
|
||||
'query',
|
||||
function='admin',
|
||||
org_id=org_id
|
||||
),
|
||||
method='GET'
|
||||
)
|
||||
return json.loads(admins)
|
||||
|
||||
|
||||
def get_admin_id(meraki, org_name, data, name=None, email=None):
|
||||
admin_id = None
|
||||
for a in data:
|
||||
if meraki.params['name'] is not None:
|
||||
if meraki.params['name'] == a['name']:
|
||||
# meraki.fail_json(msg='HERE')
|
||||
if admin_id is not None:
|
||||
meraki.fail_json(msg='There are multiple administrators with the same name')
|
||||
else:
|
||||
admin_id = a['id']
|
||||
elif meraki.params['email']:
|
||||
if meraki.params['email'] == a['email']:
|
||||
return a['id']
|
||||
if admin_id is None:
|
||||
meraki.fail_json(msg='No admin_id found')
|
||||
return admin_id
|
||||
|
||||
|
||||
def get_admin(meraki, data, id):
|
||||
for a in data:
|
||||
if a['id'] == id:
|
||||
return a
|
||||
meraki.fail_json(msg='No admin found by specified name or email')
|
||||
|
||||
|
||||
def find_admin(meraki, data, email):
|
||||
for a in data:
|
||||
if a['email'] == email:
|
||||
return a
|
||||
return None
|
||||
|
||||
|
||||
def delete_admin(meraki, org_id, admin_id):
|
||||
path = meraki.construct_path('revoke', 'admin', org_id=org_id) + admin_id
|
||||
# meraki.fail_json(msg=path)
|
||||
r = meraki.request(path,
|
||||
method='DELETE'
|
||||
)
|
||||
|
||||
|
||||
def network_factory(meraki, networks, nets):
|
||||
networks = json.loads(networks)
|
||||
networks_new = []
|
||||
for n in networks:
|
||||
networks_new.append({'id': meraki.get_net_id(org_name=meraki.params['org_name'],
|
||||
net_name=n['network'],
|
||||
data=nets),
|
||||
'access': n['access']
|
||||
})
|
||||
return networks_new
|
||||
|
||||
|
||||
def get_nets_temp(meraki, org_id): # Function won't be needed when get_nets is added to util
|
||||
path = meraki.construct_path('get_all', function='networks', org_id=org_id)
|
||||
return json.loads(meraki.request(path, method='GET'))
|
||||
|
||||
|
||||
def create_admin(meraki, org_id, name, email):
|
||||
payload = dict()
|
||||
payload['name'] = name
|
||||
payload['email'] = email
|
||||
|
||||
is_admin_existing = find_admin(meraki, get_admins(meraki, org_id), email)
|
||||
|
||||
if meraki.params['orgAccess'] is not None:
|
||||
payload['orgAccess'] = meraki.params['orgAccess']
|
||||
if meraki.params['tags'] is not None:
|
||||
payload['tags'] = json.loads(meraki.params['tags'])
|
||||
if meraki.params['networks'] is not None:
|
||||
nets = get_nets_temp(meraki, org_id)
|
||||
networks = network_factory(meraki, meraki.params['networks'], nets)
|
||||
# meraki.fail_json(msg=str(type(networks)), data=networks)
|
||||
payload['networks'] = networks
|
||||
if is_admin_existing is None: # Create new admin
|
||||
path = meraki.construct_path('create', function='admin', org_id=org_id)
|
||||
r = meraki.request(path,
|
||||
method='POST',
|
||||
payload=json.dumps(payload)
|
||||
)
|
||||
meraki.result['changed'] = True
|
||||
return json.loads(r)
|
||||
elif is_admin_existing is not None: # Update existing admin
|
||||
if not meraki.params['tags']:
|
||||
payload['tags'] = []
|
||||
if not meraki.params['networks']:
|
||||
payload['networks'] = []
|
||||
if meraki.is_update_required(is_admin_existing, payload) is True:
|
||||
# meraki.fail_json(msg='Update is required!!!', original=is_admin_existing, proposed=payload)
|
||||
path = meraki.construct_path('update', function='admin', org_id=org_id) + is_admin_existing['id']
|
||||
r = meraki.request(path,
|
||||
method='PUT',
|
||||
payload=json.dumps(payload)
|
||||
)
|
||||
meraki.result['changed'] = True
|
||||
return json.loads(r)
|
||||
else:
|
||||
# meraki.fail_json(msg='No update is required!!!')
|
||||
return -1
|
||||
|
||||
|
||||
def main():
|
||||
# define the available arguments/parameters that a user can pass to
|
||||
# the module
|
||||
argument_spec = meraki_argument_spec()
|
||||
argument_spec.update(state=dict(type='str', choices=['present', 'query', 'absent'], required=True),
|
||||
name=dict(type='str'),
|
||||
email=dict(type='str'),
|
||||
orgAccess=dict(type='str', choices=['full', 'read-only', 'none']),
|
||||
tags=dict(type='json'),
|
||||
networks=dict(type='json'),
|
||||
org_name=dict(type='str', aliases=['organization']),
|
||||
org_id=dict(type='int'),
|
||||
)
|
||||
|
||||
# seed the result dict in the object
|
||||
# we primarily care about changed and state
|
||||
# change is if this module effectively modified the target
|
||||
# state will include any data that you want your module to pass back
|
||||
# for consumption, for example, in a subsequent task
|
||||
result = dict(
|
||||
changed=False,
|
||||
)
|
||||
|
||||
# the AnsibleModule object will be our abstraction working with Ansible
|
||||
# this includes instantiation, a couple of common attr would be the
|
||||
# args/params passed to the execution, as well as if the module
|
||||
# supports check mode
|
||||
module = AnsibleModule(argument_spec=argument_spec,
|
||||
supports_check_mode=False,
|
||||
)
|
||||
meraki = MerakiModule(module, function='admin')
|
||||
|
||||
meraki.function = 'admin'
|
||||
meraki.params['follow_redirects'] = 'all'
|
||||
|
||||
query_urls = {'admin': '/organizations/{org_id}/admins',
|
||||
}
|
||||
create_urls = {'admin': '/organizations/{org_id}/admins',
|
||||
}
|
||||
update_urls = {'admin': '/organizations/{org_id}/admins/',
|
||||
}
|
||||
revoke_urls = {'admin': '/organizations/{org_id}/admins/',
|
||||
}
|
||||
|
||||
meraki.url_catalog['query'] = query_urls
|
||||
meraki.url_catalog['create'] = create_urls
|
||||
meraki.url_catalog['update'] = update_urls
|
||||
meraki.url_catalog['revoke'] = revoke_urls
|
||||
|
||||
try:
|
||||
meraki.params['auth_key'] = os.environ['MERAKI_KEY']
|
||||
except KeyError:
|
||||
pass
|
||||
|
||||
if meraki.params['auth_key'] is None:
|
||||
module.fail_json(msg='Meraki Dashboard API key not set')
|
||||
|
||||
payload = None
|
||||
|
||||
# if the user is working with this module in only check mode we do not
|
||||
# want to make any changes to the environment, just return the current
|
||||
# state with no modifications
|
||||
if module.check_mode:
|
||||
return result
|
||||
|
||||
# execute checks for argument completeness
|
||||
if meraki.params['state'] == 'query':
|
||||
meraki.mututally_exclusive = ['name', 'email']
|
||||
if not meraki.params['org_name'] and not meraki.params['org_id']:
|
||||
meraki.fail_json(msg='org_name or org_id required')
|
||||
meraki.required_if = [(['state'], ['absent'], ['email']),
|
||||
]
|
||||
|
||||
# manipulate or modify the state as needed (this is going to be the
|
||||
# part where your module will do what it needs to do)
|
||||
org_id = meraki.get_org_id(meraki.params['org_name'])
|
||||
if meraki.params['state'] == 'query':
|
||||
admins = get_admins(meraki, org_id)
|
||||
if not meraki.params['name'] and not meraki.params['email']: # Return all admins for org
|
||||
meraki.result['data'] = admins
|
||||
if meraki.params['name'] is not None: # Return a single admin for org
|
||||
admin_id = get_admin_id(meraki, meraki.params['org_name'], admins, name=meraki.params['name'])
|
||||
meraki.result['data'] = admin_id
|
||||
admin = get_admin(meraki, admins, admin_id)
|
||||
meraki.result['data'] = admin
|
||||
elif meraki.params['email'] is not None:
|
||||
admin_id = get_admin_id(meraki, meraki.params['org_name'], admins, email=meraki.params['email'])
|
||||
meraki.result['data'] = admin_id
|
||||
admin = get_admin(meraki, admins, admin_id)
|
||||
meraki.result['data'] = admin
|
||||
elif meraki.params['state'] == 'present':
|
||||
r = create_admin(meraki,
|
||||
org_id,
|
||||
meraki.params['name'],
|
||||
meraki.params['email'],
|
||||
)
|
||||
if r != -1:
|
||||
meraki.result['data'] = r
|
||||
elif meraki.params['state'] == 'absent':
|
||||
admin_id = get_admin_id(meraki,
|
||||
meraki.params['org_name'],
|
||||
get_admins(meraki, org_id),
|
||||
email=meraki.params['email']
|
||||
)
|
||||
r = delete_admin(meraki, org_id, admin_id)
|
||||
|
||||
if r != -1:
|
||||
meraki.result['data'] = r
|
||||
meraki.result['changed'] = True
|
||||
|
||||
# in the event of a successful module execution, you will want to
|
||||
# simple AnsibleModule.exit_json(), passing the key/value results
|
||||
meraki.exit_json(**meraki.result)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
217
test/integration/targets/meraki_admin/tasks/main.yml
Normal file
217
test/integration/targets/meraki_admin/tasks/main.yml
Normal file
|
@ -0,0 +1,217 @@
|
|||
# Test code for the Meraki Organization module
|
||||
# Copyright: (c) 2018, Kevin Breit (@kbreit)
|
||||
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
---
|
||||
- name: Create new administrator
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jane Doe
|
||||
email: '{{email_prefix}}+janedoe@{{email_domain}}'
|
||||
orgAccess: read-only
|
||||
delegate_to: localhost
|
||||
register: create_orgaccess
|
||||
|
||||
- name: Create new admin assertion
|
||||
assert:
|
||||
that:
|
||||
- create_orgaccess.changed == true
|
||||
- 'create_orgaccess.data.name == "Jane Doe"'
|
||||
|
||||
- name: Create administrator with tags
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: John Doe
|
||||
email: '{{email_prefix}}+johndoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
tags:
|
||||
- { "tag": "production", "access": "read-only" }
|
||||
- { "tag": "beta", "access": "full" }
|
||||
delegate_to: localhost
|
||||
register: create_tags
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- create_tags.changed == true
|
||||
- create_tags.data.name == "John Doe"
|
||||
- create_tags.data.tags | length == 2
|
||||
|
||||
- name: Create administrator with invalid tags
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jake Doe
|
||||
email: '{{email_prefix}}+jakedoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
tags:
|
||||
- { "tag": "production", "access": "read-only" }
|
||||
- { "tag": "alpha", "access": "invalid" }
|
||||
delegate_to: localhost
|
||||
register: create_tags_invalid
|
||||
ignore_errors: yes
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- '"400" in create_tags_invalid.msg'
|
||||
# - '"must contain only valid tags" in create_tags_invalid.msg'
|
||||
|
||||
- name: Create administrator with invalid tag permission
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jake Doe
|
||||
email: '{{email_prefix}}+jakedoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
tags:
|
||||
- { "tag": "production", "access": "read-only" }
|
||||
- { "tag": "beta", "access": "invalid" }
|
||||
delegate_to: localhost
|
||||
register: create_tags_invalid_permission
|
||||
ignore_errors: yes
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- '"400" in create_tags_invalid_permission.msg'
|
||||
# - '"Invalid permission type" in create_tags_invalid_permission.msg'
|
||||
|
||||
- name: Create administrator with networks
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jim Doe
|
||||
email: '{{email_prefix}}+jimdoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
networks:
|
||||
- { "network": "TestNet", "access": "read-only" }
|
||||
- { "network": "TestNet2", "access": "full" }
|
||||
delegate_to: localhost
|
||||
register: create_network
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- create_network.changed == true
|
||||
- create_network.data.name == "Jim Doe"
|
||||
- create_network.data.networks | length == 2
|
||||
|
||||
- name: Update administrator
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jim Doe
|
||||
email: '{{email_prefix}}+jimdoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
networks:
|
||||
- { "network": "TestNet", "access": "full" }
|
||||
delegate_to: localhost
|
||||
register: update_network
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- update_network.changed == true
|
||||
- update_network.data.networks.0.access == "full"
|
||||
- update_network.data.networks | length == 1
|
||||
|
||||
- name: Update administrator for idempotency check
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jim Doe
|
||||
email: '{{email_prefix}}+jimdoe@{{email_domain}}'
|
||||
orgAccess: none
|
||||
networks:
|
||||
- { "network": "TestNet", "access": "full" }
|
||||
delegate_to: localhost
|
||||
register: update_network_idempotent
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- update_network_idempotent.changed == false
|
||||
|
||||
- name: Create administrator with invalid network
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: present
|
||||
org_name: '{{test_org_name}}'
|
||||
name: John Doe
|
||||
email: '{{email_prefix}}+John@{{email_domain}}'
|
||||
orgAccess: none
|
||||
networks:
|
||||
- { "network": "readnet", "access": "read-only" }
|
||||
delegate_to: localhost
|
||||
register: create_network_invalid
|
||||
ignore_errors: yes
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- '"No network found with the name" in create_network_invalid.msg'
|
||||
# - '"400" in create_network_invalid.msg'
|
||||
|
||||
- name: Query all administrators
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: query
|
||||
org_name: '{{test_org_name}}'
|
||||
delegate_to: localhost
|
||||
register: query_all
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- query_all.data | length == 4
|
||||
- query_all.changed == False
|
||||
|
||||
- name: Query admin by name
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: query
|
||||
org_name: '{{test_org_name}}'
|
||||
name: Jane Doe
|
||||
delegate_to: localhost
|
||||
register: query_name
|
||||
|
||||
- name: Query admin by email
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: query
|
||||
org_name: '{{test_org_name}}'
|
||||
email: '{{email_prefix}}+janedoe@{{email_domain}}'
|
||||
delegate_to: localhost
|
||||
register: query_email
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- query_name.data.name == "Jane Doe"
|
||||
- 'query_email.data.email == "{{email_prefix}}+janedoe@{{email_domain}}"'
|
||||
|
||||
- name: Delete administrators
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: absent
|
||||
org_name: '{{test_org_name}}'
|
||||
email: '{{item}}'
|
||||
delegate_to: localhost
|
||||
register: delete_all
|
||||
loop:
|
||||
- '{{email_prefix}}+janedoe@{{email_domain}}'
|
||||
- '{{email_prefix}}+johndoe@{{email_domain}}'
|
||||
- '{{email_prefix}}+jimdoe@{{email_domain}}'
|
||||
|
||||
- name: Query all administrators
|
||||
meraki_admin:
|
||||
auth_key: '{{auth_key}}'
|
||||
state: query
|
||||
org_name: '{{test_org_name}}'
|
||||
delegate_to: localhost
|
||||
register: query_all_deleted
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- query_all_deleted.data | length == 1
|
Loading…
Reference in a new issue