Skip to content

Commit c0a6f34

Browse files
authored
add new resource module (#133)
1 parent e6a65ad commit c0a6f34

File tree

8 files changed

+97
-61
lines changed

8 files changed

+97
-61
lines changed

CHANGELOG.rst

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,20 @@ Check_Point.Mgmt Release Notes
44

55
.. contents:: Topics
66

7+
v6.1.0
8+
======
9+
10+
Release Summary
11+
---------------
12+
13+
This is release 6.1.0 of ``check_point.mgmt``, released on 2024-07-08.
14+
15+
New Modules
16+
-----------
17+
18+
- check_point.mgmt.cp_mgmt_set_https_advanced_settings - Configure advanced settings for HTTPS Inspection.
19+
- check_point.mgmt.cp_mgmt_show_https_advanced_settings - Show advanced settings for HTTPS Inspection.
20+
721
v6.0.0
822
======
923

changelogs/changelog.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1108,3 +1108,17 @@ releases:
11081108
name: cp_mgmt_show_mobile_access_section
11091109
namespace: ''
11101110
release_date: '2024-06-16'
1111+
6.1.0:
1112+
changes:
1113+
release_summary: This is release 6.1.0 of ``check_point.mgmt``, released on
1114+
2024-07-08.
1115+
fragments:
1116+
- 6.1.0.yml
1117+
modules:
1118+
- description: Configure advanced settings for HTTPS Inspection.
1119+
name: cp_mgmt_set_https_advanced_settings
1120+
namespace: ''
1121+
- description: Show advanced settings for HTTPS Inspection.
1122+
name: cp_mgmt_show_https_advanced_settings
1123+
namespace: ''
1124+
release_date: '2024-07-08'

galaxy.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ namespace: check_point
99
name: mgmt
1010

1111
# The version of the collection. Must be compatible with semantic versioning
12-
version: 6.0.0
12+
version: 6.1.0
1313

1414
# The path to the Markdown (.md) readme file. This path is relative to the root of the collection
1515
readme: README.md

meta/runtime.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
requires_ansible: ">=2.14.0"
2+
requires_ansible: ">=2.15.0"
33
plugin_routing:
44
modules:
55
cp_mgmt_add_nat_rule:

plugins/modules/cp_mgmt_access_rule.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,6 @@
326326
"""
327327

328328
from ansible.module_utils.basic import AnsibleModule
329-
from ansible.module_utils.connection import Connection
330329
from ansible_collections.check_point.mgmt.plugins.module_utils.checkpoint import (
331330
checkpoint_argument_spec_for_objects,
332331
api_call,

plugins/modules/cp_mgmt_access_rules.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,6 @@
300300
"""
301301

302302
from ansible.module_utils.basic import AnsibleModule
303-
from ansible.module_utils.connection import Connection
304303
from ansible_collections.check_point.mgmt.plugins.module_utils.checkpoint import (
305304
checkpoint_argument_spec_for_action_module,
306305
)

plugins/modules/cp_mgmt_set_https_advanced_settings.py

Lines changed: 64 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -28,22 +28,24 @@
2828
DOCUMENTATION = """
2929
---
3030
module: cp_mgmt_set_https_advanced_settings
31-
short_description: Edit HTTPS Inspection's Blades' Settings.
31+
short_description: Configure advanced settings for HTTPS Inspection.
3232
description:
33-
- Edit HTTPS Inspection's Blades' Settings.
33+
- Configure advanced settings for HTTPS Inspection.
3434
- All operations are performed over Web Services API.
35-
version_added: "6.0.0"
35+
version_added: "6.1.0"
3636
author: "Eden Brillant (@chkp-edenbr)"
3737
options:
3838
bypass_on_client_failure:
3939
description:
4040
- Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during
41-
handshake)<br>true - Fail-open (bypass all requests)<br>false - Fail-close (block all requests).
41+
handshake)<br><ul style="list-style-type,square"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all
42+
requests.</li></ul><br>The default value is true.
4243
type: bool
4344
bypass_on_failure:
4445
description:
4546
- Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server
46-
authentication)<br>true - Fail-open (bypass all requests)<br>false - Fail-close (block all requests).
47+
authentication)<br><ul style="list-style-type,square"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all
48+
requests.</li></ul><br>The default value is true.
4749
type: bool
4850
bypass_under_load:
4951
description:
@@ -62,33 +64,41 @@
6264
'user defined alert no.3']
6365
site_categorization_allow_mode:
6466
description:
65-
- Whether all requests should be allowed or blocked until categorization is complete.<br>Background - in order to allow requests until
66-
categorization is complete.<br>Hold- in order to block requests until categorization is complete.
67+
- Whether all requests should be allowed or blocked until categorization is complete.<br><ul style="list-style-type,square"><li>Background - to
68+
allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is
69+
hold.
6770
type: str
6871
choices: ['background', 'hold']
69-
deny_untrusted_server_cert:
72+
server_certificate_validation_actions:
7073
description:
71-
- Set to be true in order to drop traffic from servers with untrusted server certificate.
72-
type: bool
73-
deny_revoked_server_cert:
74-
description:
75-
- Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).
76-
type: bool
77-
deny_expired_server_cert:
78-
description:
79-
- Set to be true in order to drop traffic from servers with expired server certificate.
80-
type: bool
81-
track_validation_errors:
82-
description:
83-
- Whether to log and send a notification for the server validation errors,<br><ul style="list-style-type,square"><li>None - Does not record the
84-
event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to
85-
the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.
86-
type: str
87-
choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3']
74+
- When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it.
75+
type: dict
76+
suboptions:
77+
block_expired:
78+
description:
79+
- Set to be true in order to drop traffic from servers with expired server certificate.
80+
type: bool
81+
block_revoked:
82+
description:
83+
- Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).
84+
type: bool
85+
block_untrusted:
86+
description:
87+
- Set to be true in order to drop traffic from servers with untrusted server certificate.
88+
type: bool
89+
track_errors:
90+
description:
91+
- Whether to log and send a notification for the server validation errors,<br><ul style="list-style-type,square"><li>None - Does not
92+
record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail -
93+
Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized
94+
alerts.</li></ul>.
95+
type: str
96+
choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2',
97+
'user defined alert no.3']
8898
retrieve_intermediate_ca_certificates:
8999
description:
90100
- Configure the value "true" to use the "Certificate Authority Information Access" extension to retrieve certificates that are missing from the
91-
certificate chain.
101+
certificate chain.<br>The default value is true.
92102
type: bool
93103
blocked_certificates:
94104
description:
@@ -115,22 +125,20 @@
115125
the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.
116126
type: str
117127
choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3']
118-
bypass_certificate_pinned_apps:
119-
description:
120-
- Configure the value "true" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect
121-
connections initiated by certificate-pinned applications.
122-
type: bool
123128
bypass_update_services:
124129
description:
125-
- Configure the value "true" to bypass traffic to well-known software update services.
130+
- Configure the value "true" to bypass traffic to well-known software update services.<br>The default value is true.
126131
type: bool
127-
httpsi_statistics_logs:
132+
certificate_pinned_apps_action:
128133
description:
129-
- Configure the value "true" to send logs for every TLS session for all rules in HTTPS Inspection policy.
130-
type: bool
131-
log_empty_ssl_connections:
134+
- Configure the value "bypass" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot
135+
inspect connections initiated by certificate-pinned applications.<br>Configure the value "detect" to send logs for traffic from certificate-pinned
136+
applications approved by Check Point.<br>The default value is bypass.
137+
type: str
138+
choices: ['bypass', 'detect', 'none']
139+
log_sessions:
132140
description:
133-
- Configure the value "true" to send logs about SSL connections that are closed without data or are closed in the middle of a handshake.
141+
- The value "true" configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true.
134142
type: bool
135143
details_level:
136144
description:
@@ -159,20 +167,20 @@
159167
- name: set-https-advanced-settings
160168
cp_mgmt_set_https_advanced_settings:
161169
blocked_certificate_tracking: popup alert
162-
bypass_certificate_pinned_apps: 'false'
163170
bypass_on_client_failure: 'false'
164171
bypass_on_failure: 'false'
165172
bypass_under_load:
166-
track: log
173+
track: log
167174
bypass_update_services: 'true'
168-
deny_expired_server_cert: 'true'
169-
deny_revoked_server_cert: 'false'
170-
deny_untrusted_server_cert: 'true'
171-
httpsi_statistics_logs: 'true'
172-
log_empty_ssl_connections: 'true'
175+
certificate_pinned_apps_action: bypass
176+
log_sessions: 'true'
173177
retrieve_intermediate_ca_certificates: 'true'
178+
server_certificate_validation_actions:
179+
block_expired: 'true'
180+
block_revoked: 'false'
181+
block_untrusted: 'true'
182+
track_errors: snmp trap alert
174183
site_categorization_allow_mode: background
175-
track_validation_errors: snmp trap alert
176184
"""
177185

178186
RETURN = """
@@ -190,16 +198,19 @@ def main():
190198
argument_spec = dict(
191199
bypass_on_client_failure=dict(type='bool'),
192200
bypass_on_failure=dict(type='bool'),
193-
bypass_under_load=dict(type='dict', options=dict(
201+
bypass_under_load=dict(type='dict', no_log=False, options=dict(
194202
track=dict(type='str', choices=['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert',
195203
'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3'])
196204
)),
197205
site_categorization_allow_mode=dict(type='str', choices=['background', 'hold']),
198-
deny_untrusted_server_cert=dict(type='bool'),
199-
deny_revoked_server_cert=dict(type='bool'),
200-
deny_expired_server_cert=dict(type='bool'),
201-
track_validation_errors=dict(type='str', choices=['none', 'log', 'popup alert', 'mail alert',
202-
'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3']),
206+
server_certificate_validation_actions=dict(type='dict', options=dict(
207+
block_expired=dict(type='bool'),
208+
block_revoked=dict(type='bool'),
209+
block_untrusted=dict(type='bool'),
210+
track_errors=dict(type='str', choices=['none', 'log', 'popup alert', 'mail alert',
211+
'snmp trap alert', 'user defined alert no.1',
212+
'user defined alert no.2', 'user defined alert no.3'])
213+
)),
203214
retrieve_intermediate_ca_certificates=dict(type='bool'),
204215
blocked_certificates=dict(type='list', elements='dict', options=dict(
205216
name=dict(type='str'),
@@ -209,10 +220,9 @@ def main():
209220
blocked_certificate_tracking=dict(type='str', choices=['none', 'log', 'popup alert',
210221
'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2',
211222
'user defined alert no.3']),
212-
bypass_certificate_pinned_apps=dict(type='bool'),
213223
bypass_update_services=dict(type='bool'),
214-
httpsi_statistics_logs=dict(type='bool'),
215-
log_empty_ssl_connections=dict(type='bool'),
224+
certificate_pinned_apps_action=dict(type='str', choices=['bypass', 'detect', 'none']),
225+
log_sessions=dict(type='bool'),
216226
details_level=dict(type='str', choices=['uid', 'standard', 'full']),
217227
domains_to_process=dict(type='list', elements='str'),
218228
ignore_warnings=dict(type='bool'),

plugins/modules/cp_mgmt_show_https_advanced_settings.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@
2828
DOCUMENTATION = """
2929
---
3030
module: cp_mgmt_show_https_advanced_settings
31-
short_description: Show HTTPS Inspection's Blades' Settings.
31+
short_description: Show advanced settings for HTTPS Inspection.
3232
description:
33-
- Show HTTPS Inspection's Blades' Settings.
33+
- Show advanced settings for HTTPS Inspection.
3434
- All operations are performed over Web Services API.
35-
version_added: "6.0.0"
35+
version_added: "6.1.0"
3636
author: "Eden Brillant (@chkp-edenbr)"
3737
options: {}
3838
extends_documentation_fragment: check_point.mgmt.checkpoint_commands

0 commit comments

Comments
 (0)