Skip to content

Commit

Permalink
[minor_change] add support for configuration of system global aes pas…
Browse files Browse the repository at this point in the history
…sphrase encryption with aci_system_global_aes_passphrase_encryption module
  • Loading branch information
akinross authored and lhercot committed Oct 31, 2023
1 parent 3a2d5a3 commit ddb5359
Show file tree
Hide file tree
Showing 3 changed files with 339 additions and 0 deletions.
253 changes: 253 additions & 0 deletions plugins/modules/aci_system_global_aes_passphrase_encryption.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,253 @@
#!/usr/bin/python
# -*- coding: utf-8 -*-

# Copyright: (c) 2023, Tim Cragg (@timcragg) <[email protected]>
# Copyright: (c) 2023, Akini Ross (@akinross) <[email protected]>
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)

from __future__ import absolute_import, division, print_function

__metaclass__ = type

ANSIBLE_METADATA = {"metadata_version": "1.1", "status": ["preview"], "supported_by": "certified"}

DOCUMENTATION = r"""
---
module: aci_system_global_aes_passphrase_encryption
short_description: Manage Global AES Passphrase Encryption Settings (pki:ExportEncryptionKey)
description:
- Manage Global AES Passphrase Encryption Settings on Cisco ACI fabrics.
options:
passphrase:
description:
- The AES passphrase to use for configuration export encryption.
- This cannot be modified once in place on the APIC. To modify an existing passphrase, you must delete it by sending a request with state C(absent).
- The value of the passphrase will not be shown in the results of a C(query).
type: str
enable:
description:
- Whether to enable strong encryption.
- The APIC defaults to C(false) when unset during creation.
- Note that this will be set back to False when deleting an existing passphrase.
type: bool
state:
description:
- Use C(present) to create a passphrase or to change the enable setting.
- Use C(absent) to delete the existing passphrase.
- Use C(query) for showing current configuration.
type: str
choices: [ absent, present, query ]
default: present
extends_documentation_fragment:
- cisco.aci.aci
- cisco.aci.annotation
- cisco.aci.owner
seealso:
- name: APIC Management Information Model reference
description: More information about the internal APIC class B(pki:ExportEncryptionKey).
link: https://developer.cisco.com/docs/apic-mim-ref/
author:
- Tim Cragg (@timcragg)
- Akini Ross (@akinross)
"""

EXAMPLES = r"""
- name: Enable encryption with a passphrase
cisco.aci.aci_system_global_aes_passphrase_encryption:
host: apic
username: admin
password: SomeSecretPassword
passphrase: ansible_passphrase
enable: yes
state: present
delegate_to: localhost
- name: Query passphrase settings
cisco.aci.aci_system_global_aes_passphrase_encryption:
host: apic
username: admin
password: SomeSecretPassword
state: query
delegate_to: localhost
register: query_result
- name: Clear encryption key
cisco.aci.aci_system_global_aes_passphrase_encryption:
host: apic
username: admin
password: SomeSecretPassword
state: absent
delegate_to: localhost
"""

RETURN = r"""
current:
description: The existing configuration from the APIC after the module has finished
returned: success
type: list
sample:
[
{
"fvTenant": {
"attributes": {
"descr": "Production environment",
"dn": "uni/tn-production",
"name": "production",
"nameAlias": "",
"ownerKey": "",
"ownerTag": ""
}
}
}
]
error:
description: The error information as returned from the APIC
returned: failure
type: dict
sample:
{
"code": "122",
"text": "unknown managed object class foo"
}
raw:
description: The raw output returned by the APIC REST API (xml or json)
returned: parse error
type: str
sample: '<?xml version="1.0" encoding="UTF-8"?><imdata totalCount="1"><error code="122" text="unknown managed object class foo"/></imdata>'
sent:
description: The actual/minimal configuration pushed to the APIC
returned: info
type: list
sample:
{
"fvTenant": {
"attributes": {
"descr": "Production environment"
}
}
}
previous:
description: The original configuration from the APIC before the module has started
returned: info
type: list
sample:
[
{
"fvTenant": {
"attributes": {
"descr": "Production",
"dn": "uni/tn-production",
"name": "production",
"nameAlias": "",
"ownerKey": "",
"ownerTag": ""
}
}
}
]
proposed:
description: The assembled configuration from the user-provided parameters
returned: info
type: dict
sample:
{
"fvTenant": {
"attributes": {
"descr": "Production environment",
"name": "production"
}
}
}
filter_string:
description: The filter string used for the request
returned: failure or debug
type: str
sample: ?rsp-prop-include=config-only
method:
description: The HTTP method used for the request to the APIC
returned: failure or debug
type: str
sample: POST
response:
description: The HTTP response from the APIC
returned: failure or debug
type: str
sample: OK (30 bytes)
status:
description: The HTTP status from the APIC
returned: failure or debug
type: int
sample: 200
url:
description: The HTTP url used for the request to the APIC
returned: failure or debug
type: str
sample: https://10.11.12.13/api/mo/uni/tn-production.json
"""

from ansible.module_utils.basic import AnsibleModule
from ansible_collections.cisco.aci.plugins.module_utils.aci import ACIModule, aci_argument_spec, aci_annotation_spec, aci_owner_spec


def main():
argument_spec = aci_argument_spec()
argument_spec.update(aci_annotation_spec())
argument_spec.update(aci_owner_spec())
argument_spec.update(
passphrase=dict(type="str", no_log=True),
enable=dict(type="bool"),
state=dict(type="str", default="present", choices=["absent", "present", "query"]),
)

module = AnsibleModule(
argument_spec=argument_spec,
supports_check_mode=True,
)

aci = ACIModule(module)

passphrase = module.params.get("passphrase")
enable = aci.boolean(module.params.get("enable"))
state = module.params.get("state")

aci.construct_url(
root_class=dict(
aci_class="pkiExportEncryptionKey",
aci_rn="exportcryptkey",
),
)

aci.get_existing()

if state == "present":
aci.payload(
aci_class="pkiExportEncryptionKey",
class_config=dict(
passphrase=passphrase,
strongEncryptionEnabled=enable,
),
)

aci.get_diff(aci_class="pkiExportEncryptionKey")

aci.post_config()

elif state == "absent":
aci.payload(
aci_class="pkiExportEncryptionKey",
class_config=dict(
clearEncryptionKey="yes",
),
)

aci.get_diff(aci_class="pkiExportEncryptionKey")

aci.post_config()

aci.exit_json()


if __name__ == "__main__":
main()
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# No ACI simulator yet, so not enabled
# unsupported
Original file line number Diff line number Diff line change
@@ -0,0 +1,84 @@
# Test code for the ACI modules
# Copyright: (c) 2023, Tim Cragg (@timcragg) <[email protected]>
# Copyright: (c) 2023, Akini Ross (@akinross) <[email protected]>

# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)

- name: Test that we have an ACI APIC host, ACI username and ACI password
fail:
msg: 'Please define the following variables: aci_hostname, aci_username and aci_password.'
when: aci_hostname is not defined or aci_username is not defined or aci_password is not defined

# SET VARS
- name: Set vars
set_fact:
aci_info: &aci_info
host: '{{ aci_hostname }}'
username: '{{ aci_username }}'
password: '{{ aci_password }}'
validate_certs: '{{ aci_validate_certs | default(false) }}'
use_ssl: '{{ aci_use_ssl | default(true) }}'
use_proxy: '{{ aci_use_proxy | default(true) }}'
output_level: '{{ aci_output_level | default("info") }}'

- name: Verify Cloud and Non-Cloud Sites in use.
include_tasks: ../../../../../../integration/targets/aci_cloud_provider/tasks/main.yml

- name: Execute tasks only for non-cloud sites
when: query_cloud.current == [] # This condition will skip execution for cloud sites
block:

- name: Clear existing passphrase
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
state: absent

- name: Set passphrase
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
passphrase: ansible_passphrase
state: present

- name: Query key configured
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
state: query
register: query_passphrase

- name: Enable encryption
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
enable: yes
state: present

- name: Query encryption enabled
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
state: query
register: query_encryption

- name: Verify passphrase and encryption settings
ansible.builtin.assert:
that:
- query_passphrase.current.0.pkiExportEncryptionKey.attributes.keyConfigured == "yes"
- query_passphrase.current.0.pkiExportEncryptionKey.attributes.strongEncryptionEnabled == "no"
- query_encryption.current.0.pkiExportEncryptionKey.attributes.keyConfigured == "yes"
- query_encryption.current.0.pkiExportEncryptionKey.attributes.strongEncryptionEnabled == "yes"

# CLEAR PASSPHRASE
- name: Clear encryption key
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
state: absent

- name: Query cleared encryption key
cisco.aci.aci_system_global_aes_passphrase_encryption:
<<: *aci_info
state: query
register: query_deletion

- name: Verify encryption key is deleted
ansible.builtin.assert:
that:
- query_deletion.current.0.pkiExportEncryptionKey.attributes.keyConfigured == "no"
- query_deletion.current.0.pkiExportEncryptionKey.attributes.strongEncryptionEnabled == "no"

0 comments on commit ddb5359

Please sign in to comment.