-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add network access authentication rule update rank resource (#80)
- Loading branch information
1 parent
c577837
commit 3a73db7
Showing
52 changed files
with
1,300 additions
and
709 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
34 changes: 34 additions & 0 deletions
34
docs/resources/network_access_authentication_rule_update_rank.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "ise_network_access_authentication_rule_update_rank Resource - terraform-provider-ise" | ||
subcategory: "Network Access" | ||
description: |- | ||
This resource is used to update rank field in network access authentication rule. It serves as a workaround for the ISE API/Backend limitation which restricts rank assignments to a strictly incremental sequence. By utilizing this resource and network_access_authentication_rule resource, you can bypass the APIs limitation. Creation of this resource is performing PUT operation (Update) and it only tracks rank field. When this resource is destroyed, no action is performed on ISE and resource is just removed from state. | ||
--- | ||
|
||
# ise_network_access_authentication_rule_update_rank (Resource) | ||
|
||
This resource is used to update rank field in network access authentication rule. It serves as a workaround for the ISE API/Backend limitation which restricts rank assignments to a strictly incremental sequence. By utilizing this resource and network_access_authentication_rule resource, you can bypass the APIs limitation. Creation of this resource is performing PUT operation (Update) and it only tracks rank field. When this resource is destroyed, no action is performed on ISE and resource is just removed from state. | ||
|
||
## Example Usage | ||
|
||
```terraform | ||
resource "ise_network_access_authentication_rule_update_rank" "example" { | ||
auth_rule_id = "9b3680da-0165-44f6-9cff-88e778d98020" | ||
policy_set_id = "d82952cb-b901-4b09-b363-5ebf39bdbaf9" | ||
rank = 0 | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `auth_rule_id` (String) Authentication rule ID | ||
- `policy_set_id` (String) Policy set ID | ||
- `rank` (Number) The rank (priority) in relation to other rules. Lower rank is higher priority. | ||
|
||
### Read-Only | ||
|
||
- `id` (String) The id of the object |
5 changes: 5 additions & 0 deletions
5
examples/resources/ise_network_access_authentication_rule_update_rank/resource.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
resource "ise_network_access_authentication_rule_update_rank" "example" { | ||
auth_rule_id = "9b3680da-0165-44f6-9cff-88e778d98020" | ||
policy_set_id = "d82952cb-b901-4b09-b363-5ebf39bdbaf9" | ||
rank = 0 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
65 changes: 65 additions & 0 deletions
65
gen/definitions/network_access_authentication_rule_update_rank.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
--- | ||
name: Network Access Authentication Rule Update Rank | ||
# Manual update in Create function in resource file to add AuthRuleId to path | ||
# and populate attributes from existing resource using GET request in Create and Update functions | ||
res_description: | ||
'This resource is used to update rank field in network access authentication rule. It serves as a workaround for the | ||
ISE API/Backend limitation which restricts rank assignments to a strictly incremental sequence. | ||
By utilizing this resource and network_access_authentication_rule resource, you can bypass the APIs limitation. | ||
Creation of this resource is performing PUT operation (Update) and it only tracks rank field. | ||
When this resource is destroyed, no action is performed on ISE and resource is just removed from state.' | ||
rest_endpoint: /api/v1/policy/network-access/policy-set/%v/authentication | ||
put_create: true | ||
no_delete: true | ||
no_import: true | ||
no_data_source: true | ||
skip_minimum_test: true | ||
doc_category: Network Access | ||
attributes: | ||
- tf_name: auth_rule_id | ||
type: String | ||
write_only: true | ||
mandatory: true | ||
id: true | ||
description: Authentication rule ID | ||
example: 9b3680da-0165-44f6-9cff-88e778d98020 | ||
test_value: ise_network_access_authentication_rule.test.id | ||
- tf_name: policy_set_id | ||
type: String | ||
reference: true | ||
description: Policy set ID | ||
example: d82952cb-b901-4b09-b363-5ebf39bdbaf9 | ||
test_value: ise_network_access_policy_set.test.id | ||
- model_name: rank | ||
mandatory: true | ||
data_path: [rule] | ||
type: Int64 | ||
description: The rank (priority) in relation to other rules. Lower rank is higher priority. | ||
example: 0 | ||
test_prerequisites: | | ||
resource "ise_network_access_policy_set" "test" { | ||
name = "PolicySet1" | ||
service_name = "Default Network Access" | ||
condition_type = "ConditionAttributes" | ||
condition_is_negate = false | ||
condition_attribute_name = "Location" | ||
condition_attribute_value = "All Locations" | ||
condition_dictionary_name = "DEVICE" | ||
condition_operator = "equals" | ||
} | ||
resource "ise_network_access_authentication_rule" "test" { | ||
policy_set_id = ise_network_access_policy_set.test.id | ||
name = "Rule1" | ||
default = false | ||
state = "enabled" | ||
condition_type = "ConditionAttributes" | ||
condition_is_negate = false | ||
condition_attribute_name = "Location" | ||
condition_attribute_value = "All Locations" | ||
condition_dictionary_name = "DEVICE" | ||
condition_operator = "equals" | ||
identity_source_name = "Internal Endpoints" | ||
if_auth_fail = "REJECT" | ||
if_process_fail = "DROP" | ||
if_user_not_found = "REJECT" | ||
} |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
4 changes: 2 additions & 2 deletions
4
internal/provider/model_ise_active_directory_join_domain_with_all_nodes.go
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Oops, something went wrong.